Author of the publication

Eluding Secure Aggregation in Federated Learning via Model Inconsistency.

, , and . CCS, page 2429-2443. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-key and Multi-input Predicate Encryption from Learning with Errors., , , and . EUROCRYPT (3), volume 14006 of Lecture Notes in Computer Science, page 573-604. Springer, (2023)Structure-Preserving Compilers from New Notions of Obfuscations., , and . Public Key Cryptography (2), volume 13941 of Lecture Notes in Computer Science, page 663-693. Springer, (2023)Identity-Based Matchmaking Encryption Without Random Oracles., , , and . INDOCRYPT, volume 13143 of Lecture Notes in Computer Science, page 415-435. Springer, (2021)Public Immunization Against Complete Subversion Without Random Oracles., , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 465-485. Springer, (2019)Audita: A Blockchain-based Auditing Framework for Off-chain Storage., , , , , , and . SBC@AsiaCCS, page 5-10. ACM, (2021)Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models., , , , , and . IACR Cryptol. ePrint Arch., (2023)Non-malleable Fuzzy Extractors., and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 135-155. Springer, (2024)Match Me if You Can: Matchmaking Encryption and Its Applications., , , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 701-731. Springer, (2019)Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains., , and . CANS, volume 12579 of Lecture Notes in Computer Science, page 323-343. Springer, (2020)Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation., , , , and . CRYPTO (2), volume 14921 of Lecture Notes in Computer Science, page 3-39. Springer, (2024)