From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Crypto-democracy and the Trustworthy., , и . CoRR, (2014)Secure Two-Party Computation via Leaky Generalized Oblivious Transfer., и . IACR Cryptology ePrint Archive, (2013)Reactive Garbling: Foundation, Instantiation, Application., и . ASIACRYPT (2), том 10032 из Lecture Notes in Computer Science, стр. 1022-1052. (2016)Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation., , и . CCS, стр. 21-37. ACM, (2017)Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation., , , и . IACR Cryptology ePrint Archive, (2016)Foundations of Reactive Garbling Schemes., и . IACR Cryptology ePrint Archive, (2015)Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody., , и . IACR Cryptology ePrint Archive, (2018)Resource-Efficient OT Combiners with Active Security., , , и . TCC (2), том 10678 из Lecture Notes in Computer Science, стр. 461-486. Springer, (2017)Highly Efficient OT-Based Multiplication Protocols., , , и . EUROCRYPT (1), том 13275 из Lecture Notes in Computer Science, стр. 180-209. Springer, (2022)Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement., , , и . TCC (B1), том 9985 из Lecture Notes in Computer Science, стр. 204-234. (2016)