Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Maliciously Secure Two Party Computation for Mixed Programs., , and . IACR Cryptology ePrint Archive, (2017)Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates., , and . IACR Cryptology ePrint Archive, (2014)Universal Composability from Essentially Any Trusted Setup.. IACR Cryptology ePrint Archive, (2011)Characterizing Collision and Second-Preimage Resistance in Linicrypt., , and . IACR Cryptology ePrint Archive, (2018)Exploring the Limits of Common Coins Using Frontier Analysis of Protocols., , , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 486-503. Springer, (2011)Non-interactive Secure 2PC in the Offline/Online and Batch Settings., and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 425-455. (2017)SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension., , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 401-431. Springer, (2019)SWiM: Secure Wildcard Pattern Matching from OT Extension., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 222-240. Springer, (2018)Practical Privacy-Preserving K-means Clustering., , and . Proc. Priv. Enhancing Technol., 2020 (4): 414-433 (2020)Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions., , and . ACM Conference on Computer and Communications Security, page 425-442. ACM, (2020)