Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Mendler-Style Lambda-Encodings in Cedille., , and . ITP, volume 10895 of Lecture Notes in Computer Science, page 235-252. Springer, (2018)Reflection, rewinding, and coin-toss in EasyCrypt., and . CPP, page 166-179. ACM, (2022)BLT+L: Efficient Signatures from Timestamping and Endorsements., , , and . SECRYPT, page 75-86. SCITEPRESS, (2021)Formal Analysis of Non-Malleability for Commitments in EasyCrypt., , and . IACR Cryptol. ePrint Arch., (2022)Generic zero-cost reuse for dependent types., , and . Proc. ACM Program. Lang., 2 (ICFP): 104:1-104:30 (2018)Dependently typed programming with finite sets., and . WGP@ICFP, page 33-44. ACM, (2015)A New Approach to Constructing Digital Signature Schemes - (Short Paper)., , , , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 363-373. Springer, (2019)Schnorr protocol in Jasmin., , and . IACR Cryptol. ePrint Arch., (2023)Unsatisfiability of Comparison-Based Non-malleability for Commitments., , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 188-194. Springer, (2022)Zero-Knowledge in EasyCrypt., and . CSF, page 1-16. IEEE, (2023)