Author of the publication

Universally Composable Authentication and Key-Exchange with Global PKI.

, , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 265-296. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Composable Authentication with Global PKI., , and . IACR Cryptology ePrint Archive, (2014)Rational Sumchecks., , , and . IACR Cryptology ePrint Archive, (2015)Privacy-Preserving Decision Tree Training and Prediction against Malicious Server., , , , , and . IACR Cryptology ePrint Archive, (2019)CSHER: A System for Compact Storage with HE-Retrieval., , , and . USENIX Security Symposium, page 4751-4768. USENIX Association, (2023)Privacy-Preserving Decision Trees Training and Prediction., , , , , and . IACR Cryptol. ePrint Arch., (2021)New Functionality and Security Models for Cryptographic Protocols. Tel Aviv University, Israel, (2020)Tel Aviv University Library.Rational Sumchecks., , , and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 319-351. Springer, (2016)Privacy-Preserving Decision Trees Training and Prediction., , , , , and . ECML/PKDD (1), volume 12457 of Lecture Notes in Computer Science, page 145-161. Springer, (2020)Achievable CCA2 Relaxation for Homomorphic Encryption., , , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 70-99. Springer, (2022)Universally Composable Authentication and Key-Exchange with Global PKI., , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 265-296. Springer, (2016)