Author of the publication

Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices.

, , , and . MASS, page 715-720. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices., , , and . CoRR, (2021)PriFi: Low-Latency Anonymity for Organizational Networks., , , , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 24-47 (2020)PELTA - Shielding Multiparty-FHE against Malicious Adversaries., , , , , and . CCS, page 711-725. ACM, (2023)Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation., , , , and . CCS, page 3525-3527. ACM, (2023)slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference., , , , , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 359-377. Springer, (2023)Privacy-friendly mobility analytics using aggregate location data., , and . SIGSPATIAL/GIS, page 34:1-34:10. ACM, (2016)Privacy and Integrity Preserving Computations with CRISP., , , and . USENIX Security Symposium, page 2111-2128. USENIX Association, (2021)Scalable and Privacy-Preserving Federated Principal Component Analysis., , , , , , , , and . SP, page 1908-1925. IEEE, (2023)Adaptive Hierarchical Network Structures for Wireless Sensor Networks., , , , , and . ADHOCNETS, volume 89 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 65-80. Springer, (2011)P3LI5: Practical and confidEntial Lawful Interception on the 5G core., , , , and . CNS, page 1-9. IEEE, (2023)