Author of the publication

ZKBoo: Faster Zero-Knowledge for Boolean Circuits.

, , and . USENIX Security Symposium, page 1069-1083. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model Extraction and Active Learning., , , , and . CoRR, (2018)Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption., , , , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 243-261. Springer, (2018)Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model., , , , and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 1-25. Springer, (2017)Security of Linear Secret-Sharing Schemes Against Mass Surveillance., , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 43-58. Springer, (2015)Efficient UC Commitment Extension with Homomorphism for Free (and Applications)., , , , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 606-635. Springer, (2019)Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting., , , and . CSF, page 268-282. IEEE Computer Society, (2018)Privacy-Preserving Ridge Regression on Distributed Data., , , and . IACR Cryptology ePrint Archive, (2017)Efficient UC Commitment Extension with Homomorphism for Free (and Applications)., , , , , and . IACR Cryptology ePrint Archive, (2018)Compact VSS and Efficient Homomorphic UC Commitments., , , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 213-232. Springer, (2014)Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting, , , and . (2017)cite arxiv:1709.01604.