Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graceful Degradation in Multi-Party Computation., , , and . IACR Cryptology ePrint Archive, (2011)Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity., , and . IACR Cryptology ePrint Archive, (2012)Broadcast Amplification., , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 419-439. Springer, (2014)Simple and Efficient Perfectly-Secure Asynchronous MPC., and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 376-392. Springer, (2007)Erratum: A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, Springer, (2013)On Communication-Efficient Asynchronous MPC with Adaptive Security., , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 35-65. Springer, (2021)From Partial to Global Asynchronous Reliable Broadcast., , and . DISC, volume 179 of LIPIcs, page 29:1-29:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Efficient MPC with a Mixed Adversary., and . ITC, volume 163 of LIPIcs, page 3:1-3:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Player Simulation and General Adversary Structures in Perfect Multiparty Computation., and . J. Cryptol., 13 (1): 31-60 (2000)Perfectly-Secure MPC with Linear Communication Complexity., and . TCC, volume 4948 of Lecture Notes in Computer Science, page 213-230. Springer, (2008)