Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grafting Key Trees: Efficient Key Management for Overlapping Groups., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Adaptively Secure Proxy Re-encryption., , , and . Public Key Cryptography (2), volume 11443 of Lecture Notes in Computer Science, page 317-346. Springer, (2019)On Treewidth, Separators and Yao's Garbling., , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 486-517. Springer, (2021)Practical Statistically-Sound Proofs of Exponentiation in Any Group., , , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 370-399. Springer, (2022)Compact Lossy Trapdoor Functions and Selective Opening Security From LWE., , , , and . IACR Cryptol. ePrint Arch., (2023)On the Cost of Adaptivity in Graph-Based Games., , , and . IACR Cryptol. ePrint Arch., (2021)CoCoA: Concurrent Continuous Group Key Agreement., , , , , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 815-844. Springer, (2022)Grafting Key Trees: Efficient Key Management for Overlapping Groups., , , , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 222-253. Springer, (2021)The Cost of Adaptivity in Security Games on Graphs., , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 550-581. Springer, (2021)Inverse-Sybil Attacks in Automated Contact Tracing., , , , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 399-421. Springer, (2021)