Author of the publication

How to Generate and Use Universal Samplers.

, , , , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 715-744. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC., , , , and . ITC, volume 230 of LIPIcs, page 10:1-10:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE., , , and . IACR Cryptol. ePrint Arch., (2020)Weak Zero-Knowledge via the Goldreich-Levin Theorem., , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 142-173. Springer, (2023)Black-Box Non-interactive Non-malleable Commitments., , , and . EUROCRYPT (3), volume 12698 of Lecture Notes in Computer Science, page 159-185. Springer, (2021)Weakening Assumptions for Publicly-Verifiable Deletion., , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 183-197. Springer, (2023)Compact Ring Signatures from Learning with Errors., , , , , , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 282-312. Springer, (2021)A grammar-based GUI for single view reconstruction., , , , , and . ICVGIP, page 14. ACM, (2012)Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE., and . IACR Cryptol. ePrint Arch., (2020)Non-Interactive Non-Malleability from Quantum Supremacy., and . Electron. Colloquium Comput. Complex., (2018)Black-Box Non-Interactive Non-Malleable Commitments., , , and . IACR Cryptol. ePrint Arch., (2020)