Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Comparable Encryption in SIGMOD'16., , and . SIGMOD Conference, page 1069-1084. ACM, (2017)High-Throughput Secure AES Computation., , , , and . WAHC@CCS, page 13-24. ACM, (2018)Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 51-63 (2018)k-Anonymous Microdata Release via Post Randomisation Method., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 225-241. Springer, (2015)Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters., , , , , , , and . CCS, page 125-138. ACM, (2022)Implementation and evaluation of a combined optimization scheme for routing and channel assignment in wireless mesh networks., , and . CCNC, page 619-624. IEEE, (2015)Strong Security Notions for Timed-Release Public-Key Encryption Revisited., , , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 88-108. Springer, (2011)Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 202-216. Springer, (2012)Fast Large-Scale Honest-Majority MPC for Malicious Adversaries., , , , , , and . J. Cryptol., 36 (3): 15 (July 2023)Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 64-82. Springer, (2018)