Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Commodity-Based Cryptography (Extended Abstract).. STOC, page 446-455. ACM, (1997)One-Time Tables for Two-Party Computation.. COCOON, volume 1449 of Lecture Notes in Computer Science, page 361-370. Springer, (1998)Precomputing Oblivious Transfer.. CRYPTO, volume 963 of Lecture Notes in Computer Science, page 97-109. Springer, (1995)Cryptographic Protocols Provably Secure Against Dynamic Adversaries., and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 307-323. Springer, (1992)Dapper, a Large-Scale Distributed Systems Tracing Infrastructure, , , , , , , and . Google, Inc., (2010)Multiparty Computation with Faulty Majority (Extended Announcement), and . FOCS, page 468-473. IEEE Computer Society, (1989)Server-Assisted Cryptography.. Workshop on New Security Paradigms, page 92-106. ACM, (1998)Software Integrity and Validation Using Cryptographic Composability and Computer Vision.. CSCML, volume 12716 of Lecture Notes in Computer Science, page 405-413. Springer, (2021)The Round Complexity of Secure Protocols (Extended Abstract), , and . STOC, page 503-513. ACM, (1990)Computing with DNA.. J. Comput. Biol., 2 (1): 1-7 (1995)