Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Decentralized Exchange Marketplaces., , , and . CoRR, (2021)Privacy-Preserving Decentralized Exchange Marketplaces., , , and . ICBC, page 1-9. IEEE, (2022)User-Controlled Computations in Untrusted Computing Environments.. University of Waterloo, Ontario, Canada, (2018)base-search.net (ftunivwaterloo:oai:uwspace.uwaterloo.ca:10012/14352).ID Based Signcryption Scheme in Standard Model., , , and . ProvSec, volume 7496 of Lecture Notes in Computer Science, page 35-52. Springer, (2012)On the Security of ID Based Signcryption Schemes., , , and . IACR Cryptology ePrint Archive, (2011)Riding on Asymmetry: Efficient ABE for Branching Programs., and . IACR Cryptology ePrint Archive, (2014)Trusted Data Notifications from Private Blockchains., , , , and . CoRR, (2021)Depth Optimized Ansatz Circuit in QAOA for Max-Cut., , , , , and . CoRR, (2021)Atomic cross-chain exchanges of shared assets., , , and . AFT, page 148-160. ACM, (2022)Optimized QAOA ansatz circuit design for two-body Hamiltonian problems., , , , , and . VLSID, page 396-401. IEEE, (2024)