Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic Public-Key Encryption Under Continual Leakage., , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 304-323. Springer, (2016)Separations in Circular Security for Arbitrary Length Key Cycles., , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 378-400. Springer, (2015)Adaptive Multiparty NIKE., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 244-273. Springer, (2022)Indistinguishability Obfuscation for Turing Machines with Unbounded Memory., , and . IACR Cryptology ePrint Archive, (2014)Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption., and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 671-700. Springer, (2019)On the Kernelization Complexity of Colorful Motifs., , , , , , and . IPEC, volume 6478 of Lecture Notes in Computer Science, page 14-25. Springer, (2010)Chosen Ciphertext Security from Injective Trapdoor Functions., , and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 836-866. Springer, (2020)Lockable Obfuscation., , and . FOCS, page 612-621. IEEE Computer Society, (2017)Impossibility of Simulation Secure Functional Encryption Even with Random Oracles., , and . IACR Cryptology ePrint Archive, (2016)Separations in Circular Security for Arbitrary Length Key Cycles., , and . IACR Cryptology ePrint Archive, (2013)