Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limits on the Power of Garbling Techniques for Public-Key Encryption., , , and . IACR Cryptol. ePrint Arch., (2018)On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models., , and . TCC (A1), volume 9562 of Lecture Notes in Computer Science, page 18-48. Springer, (2016)Data Poisoning Attacks in Multi-Party Learning., , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 4274-4283. PMLR, (2019)Evaluating Adversarial Robustness of Secret Key-Based Defenses., , and . IEEE Access, (2022)Output stage of a dynamic current steering deep brain stimulator., , , and . ICECS, page 81-84. IEEE, (2015)More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models., , and . IACR Cryptology ePrint Archive, (2015)Complementary Detection for Hardware Efficient On-Site Monitoring of Parkinsonian Progress., and . IEEE J. Emerg. Sel. Topics Circuits Syst., 8 (3): 603-615 (2018)Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data., and . IEEE Internet Things J., 7 (10): 10401-10417 (2020)Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives., , and . IACR Cryptol. ePrint Arch., (2017)On the Power of Hierarchical Identity-Based Encryption., and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 243-272. Springer, (2016)