Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obfuscation without the Vulnerabilities of Multilinear Maps., , and . IACR Cryptol. ePrint Arch., (2016)Two Round MPC from LWE via Multi-Key FHE., and . IACR Cryptology ePrint Archive, (2015)A Tamper and Leakage Resilient Random Access Machine., , , and . IACR Cryptology ePrint Archive, (2014)Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 626-642. Springer, (2022)A More Complete Analysis of the Signal Double Ratchet Algorithm., , , , and . CRYPTO (1), volume 13507 of Lecture Notes in Computer Science, page 784-813. Springer, (2022)PASTA: PASsword-based Threshold Authentication., , , and . CCS, page 2042-2059. ACM, (2018)Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits., , , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 111-128. Springer, (2014)Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 467-495. Springer, (2019)BETA: Biometric Enabled Threshold Authentication., , , , and . IACR Cryptol. ePrint Arch., (2020)Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits., , , and . IACR Cryptology ePrint Archive, (2013)