Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Existence of Extractable One-Way Functions., , , and . SIAM J. Comput., 45 (5): 1910-1952 (2016)On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation., and . IACR Cryptology ePrint Archive, (2015)Perfect Structure on the Edge of Chaos., , and . IACR Cryptology ePrint Archive, (2015)ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation., and . IACR Cryptology ePrint Archive, (2014)On Oblivious Amplification of Coin-Tossing Protocols., and . IACR Cryptology ePrint Archive, (2019)A Note on Perfect Correctness by Derandomization., and . J. Cryptol., 35 (3): 18 (2022)Why "Fiat-Shamir for Proofs" Lacks a Proof., , and . IACR Cryptol. ePrint Arch., (2012)Post-quantum Resettably-Sound Zero Knowledge., , and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 62-89. Springer, (2021)Statistically Sender-Private OT from LPN and Derandomization., and . CRYPTO (3), volume 13509 of Lecture Notes in Computer Science, page 625-653. Springer, (2022)Non-interactive Universal Arguments., , , and . CRYPTO (2), volume 14082 of Lecture Notes in Computer Science, page 132-158. Springer, (2023)