Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography., , and . IACR Cryptol. ePrint Arch., (2024)A Note on Copy-Protection from Random Oracles., and . IACR Cryptol. ePrint Arch., (2022)Unclonable Encryption, Revisited., and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 299-329. Springer, (2021)On the Feasibility of Unclonable Encryption, and More., , , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 212-241. Springer, (2022)Uncloneable Encryption, Revisited., and . IACR Cryptol. ePrint Arch., (2021)Pseudorandom Isometries., , , and . IACR Cryptol. ePrint Arch., (2023)Cloning Games: A General Framework for Unclonable Primitives., , and . CRYPTO (5), volume 14085 of Lecture Notes in Computer Science, page 66-98. Springer, (2023)Pseudorandom Isometries., , , and . EUROCRYPT (4), volume 14654 of Lecture Notes in Computer Science, page 226-254. Springer, (2024)