Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Two-Party Computation via Leaky Generalized Oblivious Transfer., and . IACR Cryptology ePrint Archive, (2013)The Crypto-democracy and the Trustworthy., , and . CoRR, (2014)Reactive Garbling: Foundation, Instantiation, Application., and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 1022-1052. (2016)Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation., , and . CCS, page 21-37. ACM, (2017)Resource-Efficient OT Combiners with Active Security., , , and . TCC (2), volume 10678 of Lecture Notes in Computer Science, page 461-486. Springer, (2017)Foundations of Reactive Garbling Schemes., and . IACR Cryptology ePrint Archive, (2015)Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation., , , and . IACR Cryptology ePrint Archive, (2016)Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody., , and . IACR Cryptology ePrint Archive, (2018)Highly Efficient OT-Based Multiplication Protocols., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 180-209. Springer, (2022)On the Computational Overhead of MPC with Dishonest Majority., and . IACR Cryptology ePrint Archive, (2016)