Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge., , , , , and . CCS, page 2098-2112. ACM, (2023)On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications., , , and . SSS, volume 13046 of Lecture Notes in Computer Science, page 350-364. Springer, (2021)Longitudinal Analysis of Misuse of Bitcoin., , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 259-278. Springer, (2019)VRASED: A Verified Hardware/Software Co-Design for Remote Attestation., , , , and . USENIX Security Symposium, page 1429-1446. USENIX Association, (2019)Quantum Optimization Heuristics with an Application to Knapsack Problems., , , and . QCE, page 160-170. IEEE, (2021)Traffic Analysis by Adversaries with Partial Visibility., , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 338-358. Springer, (2023)Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head., , , , , , and . CCS, page 2587-2600. ACM, (2021)Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 565-584. Springer, (2022)Short Concurrent Covert Authenticated Key Exchange (Short cAKE)., , and . ASIACRYPT (8), volume 14445 of Lecture Notes in Computer Science, page 75-109. Springer, (2023)In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms., , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 447-467. Springer, (2022)