Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation., , , , and . ACISP (2), volume 14896 of Lecture Notes in Computer Science, page 330-349. Springer, (2024)Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions., , and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 750-781. Springer, (2021)Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution., and . CBMS, page 799-804. IEEE Computer Society, (2017)Security in a Distributed Key Management Approach, , , , and . (2017)Composable Long-Term Security with Rewinding., , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 510-541. Springer, (2023)Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels., , and . ASIACRYPT (4), volume 14441 of Lecture Notes in Computer Science, page 268-301. Springer, (2023)Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules., , and . Sicherheit, volume P-323 of LNI, page 83-99. Gesellschaft für Informatik e.V., (2022)Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution with SGX, and . (2017)Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework., , , , , , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 243-261. Springer, (2019)SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , and . GI-Jahrestagung, volume P-307 of LNI, page 111-113. GI, (2020)