Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Atomic and Fair Data Exchange via Blockchain., , , , , , and . IACR Cryptol. ePrint Arch., (2024)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . ACNS (3), volume 14585 of Lecture Notes in Computer Science, page 105-134. Springer, (2024)Attribute-Based Encryption for Arithmetic Circuits., , and . IACR Cryptology ePrint Archive, (2013)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . IACR Cryptol. ePrint Arch., (2022)Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems., , and . IACR Cryptology ePrint Archive, (2019)STROBE: Streaming Threshold Random Beacons., , , , , , , , and . AFT, volume 282 of LIPIcs, page 7:1-7:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures., , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 577-608. Springer, (2021)Privacy-preserving matrix factorization., , , , , and . CCS, page 801-812. ACM, (2013)Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes., , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 457-477. Springer, (2017)Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems., , and . AFT, page 189-201. ACM, (2020)