From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH., , , и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 305-334. Springer, (2021)Cryptographic Group Actions and Applications., , , и . ASIACRYPT (2), том 12492 из Lecture Notes in Computer Science, стр. 411-439. Springer, (2020)Cryptographic Primitives with Hinting Property., и . J. Cryptol., 37 (3): 21 (сентября 2024)New (and Old) Proof Systems for Lattice Problems., , и . Public Key Cryptography (2), том 10770 из Lecture Notes in Computer Science, стр. 619-643. Springer, (2018)Laconic Private Set Intersection and Applications., , , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 94-125. Springer, (2021)Symmetric Primitives with Structured Secrets., , и . CRYPTO (1), том 11692 из Lecture Notes in Computer Science, стр. 650-679. Springer, (2019)Algebraic Frameworks for Cryptographic Primitives.. University of Michigan, USA, (2020)On Black-Box Verifiable Outsourcing., , , , и . TCC (1), том 14369 из Lecture Notes in Computer Science, стр. 158-187. Springer, (2023)Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs., , и . CT-RSA, том 13871 из Lecture Notes in Computer Science, стр. 333-359. Springer, (2023)Cryptographic Primitives with Hinting Property., и . ASIACRYPT (1), том 13791 из Lecture Notes in Computer Science, стр. 33-62. Springer, (2022)