From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity-based Encryption from the Diffie-Hellman Assumption., и . J. ACM, 68 (3): 14:1-14:46 (2021)Tight Verifiable Delay Functions., , , и . IACR Cryptol. ePrint Arch., (2019)Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More., , и . IACR Cryptol. ePrint Arch., (2019)Hardness Preserving Constructions of Pseudorandom Functions, Revisited., и . IACR Cryptol. ePrint Arch., (2012)Registration-Based Encryption from Standard Assumptions., , , , и . IACR Cryptol. ePrint Arch., (2018)Incremental Program Obfuscation., и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 193-223. Springer, (2017)TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption., , и . CRYPTO (3), том 9816 из Lecture Notes in Computer Science, стр. 563-592. Springer, (2016)Laconic Private Set Intersection and Applications., , , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 94-125. Springer, (2021)Amortizing Rate-1 OT and Applications to PIR and PSI., , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 126-156. Springer, (2021)zkSaaS: Zero-Knowledge SNARKs as a Service., , , , и . USENIX Security Symposium, стр. 4427-4444. USENIX Association, (2023)