Author of the publication

Constrained Pseudorandom Functions for Unconstrained Inputs.

, , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 124-153. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal Samplers with Fast Verification., , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 525-554. Springer, (2017)Adaptively Secure Constrained Pseudorandom Functions., , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 357-376. Springer, (2019)Collusion Resistant Traitor Tracing from Learning with Errors., , and . SIAM J. Comput., (2020)Collusion resistant traitor tracing from learning with errors., , and . STOC, page 660-670. ACM, (2018)NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations., , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 738-767. Springer, (2020)Simpler Proofs of Quantumness., , , and . TQC, volume 158 of LIPIcs, page 8:1-8:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)On Perfect Correctness in (Lockable) Obfuscation., , , and . TCC (1), volume 12550 of Lecture Notes in Computer Science, page 229-259. Springer, (2020)Semi-adaptive Security and Bundling Functionalities Made Generic and Easy., , and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 361-388. (2016)Deterministic Public-Key Encryption Under Continual Leakage., , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 304-323. Springer, (2016)Adaptive Multiparty NIKE., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 244-273. Springer, (2022)