Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Computation Goes Live, , , , , , , , , and 2 other author(s). Cryptology ePrint Archive, (2008)Report 2008/068.Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator, and . Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, page 378-394. Berlin Heidelberg, Springer, (2005)General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, , and . Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, page 316-334. Berlin Heidelberg, Springer, (2000)Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption, and . Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, page 247-264. Berlin Heidelberg, Springer, (2003)Multiparty Computation from Threshold Homomorphic Encryption, , and . Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, page 280-300. Berlin Heidelberg, Springer, (2001)On Adaptive vs. Non-adaptive Security of Multiparty Protocols, , , , and . Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, page 262-279. Berlin Heidelberg, Springer, (2001)