Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-time Computable and Uncomputable Functions., , and . IACR Cryptology ePrint Archive, (2010)On the complexity of verifiable secret sharing and multiparty computation., , and . STOC, page 325-334. ACM, (2000)Efficient Multiparty Computations Secure Against an Adaptive Adversary., , , , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 311-326. Springer, (1999)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , and . J. Cryptol., 32 (1): 151-177 (2019)How to pair with a human.. IACR Cryptol. ePrint Arch., (2009)Leakage-Resilient Cryptography From the Inner-Product Extractor., and . IACR Cryptol. ePrint Arch., (2011)How Much Memory is Needed to Win Infinite Games?, , and . LICS, page 99-110. IEEE Computer Society, (1997)Individual Cryptography., , and . CRYPTO (2), volume 14082 of Lecture Notes in Computer Science, page 547-579. Springer, (2023)Bounded-Retrieval Model with Keys Derived from Private Data., , , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 273-290. Springer, (2016)Tight security proofs for the bounded-storage model., and . STOC, page 341-350. ACM, (2002)