Author of the publication

Secure Multiparty Computations on Bitcoin.

, , , and . IEEE Symposium on Security and Privacy, page 443-458. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-time Computable and Uncomputable Functions., , and . IACR Cryptology ePrint Archive, (2010)On the complexity of verifiable secret sharing and multiparty computation., , and . STOC, page 325-334. ACM, (2000)Leakage-Resilient Cryptography From the Inner-Product Extractor., and . IACR Cryptol. ePrint Arch., (2011)How to pair with a human.. IACR Cryptol. ePrint Arch., (2009)Efficient Multiparty Computations Secure Against an Adaptive Adversary., , , , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 311-326. Springer, (1999)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , and . J. Cryptol., 32 (1): 151-177 (2019)Individual Cryptography., , and . CRYPTO (2), volume 14082 of Lecture Notes in Computer Science, page 547-579. Springer, (2023)How Much Memory is Needed to Win Infinite Games?, , and . LICS, page 99-110. IEEE Computer Society, (1997)Bounded-Retrieval Model with Keys Derived from Private Data., , , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 273-290. Springer, (2016)Optimal Amplification of Noisy Leakages., , and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 291-318. Springer, (2016)