Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Discrete-Logarithm Problem with Preprocessing., and . IACR Cryptology ePrint Archive, (2017)FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions., and . ACM DEV, page 1-10. ACM, (2014)The Discrete-Logarithm Problem with Preprocessing., and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 415-447. Springer, (2018)Private Information Retrieval with Sublinear Online Time., and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 44-75. Springer, (2020)One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval., , , , and . USENIX Security Symposium, page 3889-3905. USENIX Association, (2023)The One-Wayness of Jacobi Signatures., and . IACR Cryptol. ePrint Arch., (2023)FlashPatch: spreading software updates over flash drives in under-connected regions., and . ACM DEV (4), page 15:1-15:2. ACM, (2013)Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts., and . HotOS, USENIX Association, (2015)Quantum Operating Systems., , and . HotOS, page 76-81. ACM, (2017)Lightweight Techniques for Private Heavy Hitters., , , , and . CoRR, (2020)