Author of the publication

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.

, , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrollThrottle - Raising the Cost of Astroturfing., , , , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 456-476. Springer, (2020)Periodicity detection in irregularly sampled light curves by robust regression and outlier detection., , , and . Stat. Anal. Data Min., 6 (1): 73-89 (2013)On the Security Relevance of Initial Weights in Deep Neural Networks., , , , and . ICANN (1), volume 12396 of Lecture Notes in Computer Science, page 3-14. Springer, (2020)AnoA: A Framework for Analyzing Anonymous Communication Protocols., , , , and . J. Priv. Confidentiality, (2016)PrivSyn: Differentially Private Data Synthesis., , , , , , , and . CoRR, (2020)Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild., , , and . DSN, page 569-580. IEEE, (2021)Membership Inference Attacks by Exploiting Loss Trajectory., , , and . CCS, page 2085-2098. ACM, (2022)A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web., , , , and . USENIX Security Symposium, page 683-697. USENIX Association, (2020)PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models., , , , , , and . USENIX Security Symposium, page 1649-1666. USENIX Association, (2023)ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models., , , , , and . NDSS, The Internet Society, (2019)