Author of the publication

Two-Round Oblivious Transfer from CDH or LPN.

, , , , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 768-797. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

McFly: Verifiable Encryption to the Future Made Practical., , , and . FC (1), volume 13950 of Lecture Notes in Computer Science, page 252-269. Springer, (2023)McFly: Verifiable Encryption to the Future Made Practical., , , and . IACR Cryptol. ePrint Arch., (2022)On The Black-Box Complexity of Correlation Intractability., and . IACR Cryptol. ePrint Arch., (2023)Two-Round Oblivious Transfer from CDH or LPN., , , , and . IACR Cryptol. ePrint Arch., (2019)Identity-Based Encryption from the Diffie-Hellman Assumption., and . IACR Cryptol. ePrint Arch., (2017)On the Impossibility of Purely Algebraic Signatures., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 317-349. Springer, (2021)Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions., , , , and . TCC (1), volume 12550 of Lecture Notes in Computer Science, page 58-87. Springer, (2020)Adversarial Examples and Metrics., , , and . CoRR, (2020)Algebraic Restriction Codes and Their Applications., , , , , and . Algorithmica, 85 (12): 3602-3648 (December 2023)Efficient UC Commitment Extension with Homomorphism for Free (and Applications)., , , , , and . IACR Cryptology ePrint Archive, (2018)