Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack., and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 90-106. Springer, (1999)The Complexity of Problems in P Given Correlated Instances., and . ITCS, volume 67 of LIPIcs, page 13:1-13:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Pseudo-deterministic Algorithms (Invited Talk).. STACS, volume 14 of LIPIcs, page 29-29. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)Leakage-resilient coin tossing., , and . Distributed Comput., 27 (3): 147-164 (2014)Functional Signatures and Pseudorandom Functions., , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 501-519. Springer, (2014)How to Compute in the Presence of Leakage., and . SIAM J. Comput., 44 (5): 1480-1549 (2015)The Complexity of Decision Versus Search., and . SIAM J. Comput., 23 (1): 97-119 (1994)A ``paradoxical'' solution to the signature problem, , and . Proceedings of the IEEE 25th Annual Symposium on Foundations of Computer Science, page 441--448. (1984)Verifiable Partial Key Escrow., and . IACR Cryptology ePrint Archive, (1996)Primality Testing Using Elliptic Curves., and . J. ACM, 46 (4): 450-472 (1999)