Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain with Varying Number of Players., , , , , and . IACR Cryptol. ePrint Arch., (2020)Concurrently Composable Non-Interactive Secure Computation., and . IACR Cryptol. ePrint Arch., (2021)On the Adaptive Security of MACs and PRFs., , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 724-753. Springer, (2020)Concurrently Composable Non-interactive Secure Computation., and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 526-555. Springer, (2022)Polynomial Identity Testing via Evaluation of Rational Functions., and . ITCS, volume 215 of LIPIcs, page 119:1-119:24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Query Complexity of Inversion Minimization on Trees., , and . SODA, page 2836-2866. SIAM, (2023)Succinct Non-Interactive Secure Computation., , and . IACR Cryptology ePrint Archive, (2019)Minimum Circuit Size, Graph Isomorphism, and Related Problems., , , , and . Electron. Colloquium Comput. Complex., (2017)Parametric reconstruction of internal building structures via canonical scattering mechanisms., , , , , , , , , and 2 other author(s). ICASSP, page 5189-5192. IEEE, (2008)Query Complexity of Inversion Minimization on Trees., , and . CoRR, (2022)