Author of the publication

A Holistic Security Analysis of Monero Transactions.

, , and . EUROCRYPT (3), volume 14653 of Lecture Notes in Computer Science, page 129-159. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Token meets Wallet: Formalizing Privacy and Revocation for FIDO2., , and . IACR Cryptol. ePrint Arch., (2022)FRIDA: Data Availability Sampling from FRI., , and . IACR Cryptol. ePrint Arch., (2024)Neural-Symbolic Integration for Fairness in AI., and . AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering, volume 2846 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Generic constructions of master-key KDM secure attribute-based encryption., , and . Des. Codes Cryptogr., 92 (1): 51-92 (January 2024)Lattice-Based Authenticated Key Exchange with Tight Security., , and . CRYPTO (5), volume 14085 of Lecture Notes in Computer Science, page 616-647. Springer, (2023)Tighter Security for Generic Authenticated Key Exchange in the QROM., , and . ASIACRYPT (4), volume 14441 of Lecture Notes in Computer Science, page 401-433. Springer, (2023)Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions., and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 597-627. Springer, (2023)Neural-Symbolic Integration for Interactive Learning and Conceptual Grounding., and . CoRR, (2021)Understanding Counterexamples for Relational Properties with DIbugger., , , , , , , , and . HCVS/PERR@ETAPS, volume 296 of EPTCS, page 6-13. (2019)Token meets Wallet: Formalizing Privacy and Revocation for FIDO2., , and . SP, page 1491-1508. IEEE, (2023)