Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden Voice Commands., , , , , , , and . USENIX Security Symposium, page 513-530. USENIX Association, (2016)Recursive Proof Composition from Accumulation Schemes., , , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 1-18. Springer, (2020)Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS., , , , , and . IACR Cryptol. ePrint Arch., (2019)Proof-Carrying Data without Succinct Arguments., , , , and . IACR Cryptol. ePrint Arch., (2020)Proof-Carrying Data Without Succinct Arguments., , , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 681-710. Springer, (2021)ZEXE: Enabling Decentralized Private Computation., , , , , and . SP, page 947-964. IEEE, (2020)Smart Locks: Lessons for Securing Commodity Internet of Things Devices., , , , , and . AsiaCCS, page 461-472. ACM, (2016)Delphi: A Cryptographic Inference System for Neural Networks., , , , and . PPMLP@CCS, page 27-30. ACM, (2020)Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS., , , , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 738-768. Springer, (2020)Proofs for Inner Pairing Products and Applications., , , , and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 65-97. Springer, (2021)