Author of the publication

Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.

, , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 557-585. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Incentivize Data-Driven Collaboration Among Competing Parties., , and . IACR Cryptology ePrint Archive, (2015)A Note on the Impossibility of Obfuscation with Auxiliary Input., and . IACR Cryptology ePrint Archive, (2013)Verifiable Partial Key Escrow., and . IACR Cryptology ePrint Archive, (1996)Primality Testing Using Elliptic Curves., and . J. ACM, 46 (4): 450-472 (1999)The Complexity of Problems in P Given Correlated Instances., and . ITCS, volume 67 of LIPIcs, page 13:1-13:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Pseudo-deterministic Algorithms (Invited Talk).. STACS, volume 14 of LIPIcs, page 29-29. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)Leakage-resilient coin tossing., , and . Distributed Comput., 27 (3): 147-164 (2014)On the Limits of Nonapproximability of Lattice Problems., and . J. Comput. Syst. Sci., 60 (3): 540-563 (2000)On the (In)security of the Fiat-Shamir Paradigm., and . Electron. Colloquium Comput. Complex., (2003)Delegating Computation: Interactive Proofs for Muggles., , and . J. ACM, 62 (4): 27:1-27:64 (2015)