Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)A Spendable Cold Wallet from QR Video., , , , and . SECRYPT, page 283-290. SCITEPRESS, (2022)How Secure is Deterministic Encryption?, , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 52-73. Springer, (2015)Insured MPC: Efficient Secure Computation with Financial Penalties., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 404-420. Springer, (2020)Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 500-519. Springer, (2018)21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State., , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 45-63. Springer, (2018)Towards Trusted eHealth Services in the Cloud., and . UCC, page 618-623. IEEE Computer Society, (2015)On the Commitment Capacity of Unfair Noisy Channels., , and . CoRR, (2019)On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries., and . CoRR, (2014)Digital Signatures from Strong RSA without Prime Generation., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 217-235. Springer, (2015)