Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perennial secure multi-party computation of universal Turing machine., , , , and . Theor. Comput. Sci., (2019)Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)., , , , and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 69-83. Springer, (2013)Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast)., , , , and . IACR Cryptology ePrint Archive, (2019)Efficient Agreement on Bounded-Degree Networks., and . ICPP (1), page 188-191. Pennsylvania State University Press, (1989)Application-Independent End-to-End Security in Shared-Link Access Networks., and . NETWORKING, volume 1815 of Lecture Notes in Computer Science, page 608-619. Springer, (2000)Fast, Long-Lived Renaming Improved and Simplified., and . WDAG, volume 1151 of Lecture Notes in Computer Science, page 287-303. Springer, (1996)Timed Release of Standard Digital Signatures., and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 168-182. Springer, (2002)Optimal Probabilistic Synchronous Byzantine Agreement.. Encyclopedia of Algorithms, (2016)MAC Precomputation with Applications to Secure Memory., , and . ACM Trans. Priv. Secur., 19 (2): 6:1-6:21 (2016)Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer., , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 505-523. Springer, (2009)