Author of the publication

MPC vs. SFE : Unconditional and Computational Security.

, , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 1-18. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Erratum: A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, Springer, (2013)Simple and Efficient Perfectly-Secure Asynchronous MPC., and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 376-392. Springer, (2007)Broadcast Amplification., , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 419-439. Springer, (2014)On Communication-Efficient Asynchronous MPC with Adaptive Security., , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 35-65. Springer, (2021)From Partial to Global Asynchronous Reliable Broadcast., , and . DISC, volume 179 of LIPIcs, page 29:1-29:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Efficient Byzantine Agreement with Faulty Minority., , and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 393-409. Springer, (2007)Graceful Degradation in Multi-Party Computation (Extended Abstract)., , , and . ICITS, volume 6673 of Lecture Notes in Computer Science, page 163-180. Springer, (2011)Efficient Multi-party Computation with Dispute Control., and . TCC, volume 3876 of Lecture Notes in Computer Science, page 305-328. Springer, (2006)Anamorphic Encryption, Revisited., , , , and . EUROCRYPT (2), volume 14652 of Lecture Notes in Computer Science, page 3-32. Springer, (2024)Asynchronous Multiparty Computation with Linear Communication Complexity., , and . DISC, volume 8205 of Lecture Notes in Computer Science, page 388-402. Springer, (2013)