Author of the publication

Rationality and Adversarial Behavior in Multi-party Computation.

, and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 180-197. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)., , , and . ACM Conference on Computer and Communications Security, page 1032-1047. ACM, (2015)Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems., , and . Algorithmica, 60 (3): 505-552 (2011)Transparency Logs via Append-Only Authenticated Dictionaries., , , , , and . CCS, page 1299-1316. ACM, (2019)chiku: Efficient Probabilistic Polynomial Approximations Library., , , and . SECRYPT, page 634-641. SCITEPRESS, (2024)Super-Efficient Verification of Dynamic Outsourced Databases., , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 407-424. Springer, (2008)Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation., , , and . CoRR, (2019)Hourglass schemes: how to prove that cloud files are encrypted., , , , , and . CCS, page 265-280. ACM, (2012)Private Hierarchical Clustering and Efficient Approximation., , , and . CCSW, page 3-20. ACM, (2021)VaultBox: Enhancing the Security and Effectiveness of Security Analytics., and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 401-422. Springer, (2023)SigML: Supervised Log Anomaly with Fully Homomorphic Encryption., , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 372-388. Springer, (2023)