Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Exchange: A Marketplace in the Cloud., , , , and . IACR Cryptology ePrint Archive, (2016)Cheaper Private Set Intersection via Differentially Private Leakage., , and . Proc. Priv. Enhancing Technol., 2019 (3): 6-25 (2019)Fast Database Joins and PSI for Secret Shared Data., , and . ACM Conference on Computer and Communications Security, page 1271-1287. ACM, (2020)A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets., , , , , , , , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 443-467. Springer, (2023)Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes., , and . CRYPTO (3), volume 12827 of Lecture Notes in Computer Science, page 502-534. Springer, (2021)Multi-party Threshold Private Set Intersection with Sublinear Communication., , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 349-379. Springer, (2021)ABY3: A Mixed Protocol Framework for Machine Learning., and . ACM Conference on Computer and Communications Security, page 35-52. ACM, (2018)Privacy-Enhancing Technologies for Financial Data Sharing., , , , and . CoRR, (2023)Oblivious Extractors and Improved Security in Biometric-based Authentication Systems., , and . IACR Cryptol. ePrint Arch., (2022)Malicious-Secure Private Set Intersection via Dual Execution., and . CCS, page 1229-1242. ACM, (2017)