From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Going Beyond Dual Execution: MPC for Functions with Efficient Verification., , и . Public Key Cryptography (2), том 12111 из Lecture Notes in Computer Science, стр. 328-356. Springer, (2020)The Price of Active Security in Cryptographic Protocols., , и . EUROCRYPT (2), том 12106 из Lecture Notes in Computer Science, стр. 184-215. Springer, (2020)Round-Optimal Secure Multi-party Computation., , , и . J. Cryptol., 34 (3): 19 (2021)TinyKeys: A New Approach to Efficient Multi-Party Computation., , , и . J. Cryptol., 35 (2): 13 (2022)Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)., , , и . ASIACRYPT (3), том 11274 из Lecture Notes in Computer Science, стр. 86-117. Springer, (2018)On the Feasibility of Sliced Garbling., , и . IACR Cryptol. ePrint Arch., (2024)Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More., , и . ITC, том 230 из LIPIcs, стр. 3:1-3:24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs.. J. Cryptol., 31 (2): 537-586 (2018)Toward a Game Theoretic View of Secure Computation., , и . J. Cryptol., 29 (4): 879-926 (2016)Ligero++: A New Optimized Sublinear IOP., , , , , и . ACM Conference on Computer and Communications Security, стр. 2025-2038. ACM, (2020)