Author of the publication

Laconic Oblivious Transfer and Its Applications.

, , , , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 33-65. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuous Non-Malleable Codes in the 8-Split-State Model., , , , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 531-561. Springer, (2019)Multiparty Cardinality Testing for Threshold Private Set Intersection., , and . IACR Cryptol. ePrint Arch., (2020)Two-Round Oblivious Transfer from CDH or LPN., , , , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 768-797. Springer, (2020)Hardness of LWE on General Entropic Distributions., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 551-575. Springer, (2020)Candidate iO from Homomorphic Encryption Schemes., , , and . J. Cryptol., 36 (3): 27 (July 2023)Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13., , , and . IACR Cryptol. ePrint Arch., (2016)Algebraic Restriction Codes and their Applications., , , , , and . IACR Cryptol. ePrint Arch., (2021)Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model., , and . Electron. Colloquium Comput. Complex., (2017)Two-Message Statistically Sender-Private OT from LWE., and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 370-390. Springer, (2018)Interaction-Preserving Compilers for Secure Computation., , , and . ITCS, volume 215 of LIPIcs, page 57:1-57:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)