Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts., , , , and . ACM Conference on Computer and Communications Security, page 1769-1787. ACM, (2020)Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage., , and . IACR Cryptol. ePrint Arch., (2022)UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts., , , , and . IACR Cryptol. ePrint Arch., (2021)Highly Efficient OT-Based Multiplication Protocols., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 180-209. Springer, (2022)Fairness in two-party computation : characterizing fair functions.. Pompeu Fabra University, Spain, (2016)Some constructions of maximal witness codes., and . ISIT, page 2105-2109. IEEE, (2011)On the Complexity of Fair Coin Flipping., , and . TCC (1), volume 11239 of Lecture Notes in Computer Science, page 539-562. Springer, (2018)Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions., , , and . IACR Cryptology ePrint Archive, (2014)Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions., , , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 199-228. Springer, (2015)UC Non-Interactive, Proactive, Threshold ECDSA., , and . IACR Cryptol. ePrint Arch., (2020)