Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Function Secret Sharing: Improvements and Extensions., , and . ACM Conference on Computer and Communications Security, page 1292-1303. ACM, (2016)Bounded Indistinguishability and the Complexity of Recovering Secrets., , , and . Electron. Colloquium Comput. Complex., (2015)Special Section on the Forty-Fifth Annual ACM Symposium on the Theory of Computing (STOC 2013)., , and . SIAM J. Comput., 45 (2): 459-460 (2016)Trapdoor Hash Functions and Their Applications., , , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 3-32. Springer, (2019)Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC., , , , and . CCS, page 1591-1605. ACM, (2020)Distribution Design., , , and . ITCS, page 81-92. ACM, (2016)Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation., , , , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 129-161. Springer, (2021)The complexity of information theoretic secure computation.. ITW, page 80. IEEE, (2012)On Pseudorandom Generators with Linear Stretch in NC0., , and . Comput. Complex., 17 (1): 38-69 (2008)Semantic Security under Related-Key Attacks and Applications., , and . ICS, page 45-60. Tsinghua University Press, (2011)