Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution., , , , and . IACR Cryptology ePrint Archive, (2018)How To Bootstrap Anonymous Communication., and . ITCS, page 333-344. ACM, (2016)Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution., , , , and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 595-626. Springer, (2018)Information Theoretical Cryptogenography.. J. Cryptol., 30 (4): 1067-1115 (2017)Timeability of Extensive-Form Games., , and . CoRR, (2015)Cryptogenography., , , and . ITCS, page 13-22. ACM, (2014)Mutual Information Matrices Are Not Always Positive Semidefinite.. IEEE Trans. Inf. Theory, 60 (5): 2694-2696 (2014)Cryptogenography: anonymity without trust.. Queen Mary University of London, UK, (2016)British Library, EThOS.A Numbers-on-Foreheads Game.. MFCS (2), volume 9235 of Lecture Notes in Computer Science, page 420-431. Springer, (2015)How to Bootstrap Anonymous Communication., and . IACR Cryptology ePrint Archive, (2015)