Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple Homomorphisms of Cocks IBE and Applications.. IACR Cryptology ePrint Archive, (2016)Adversarially Robust Property-Preserving Hash Functions., , and . ITCS, volume 124 of LIPIcs, page 16:1-16:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Topology-Hiding Computation Beyond Semi-Honest Adversaries., , , , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 3-35. Springer, (2018)Adversarially Robust Property Preserving Hash Functions., , and . IACR Cryptology ePrint Archive, (2018)Topology-Hiding Computation for Networks with Unknown Delays., , , , , and . IACR Cryptology ePrint Archive, (2019)Public-Key Cryptography in the Fine-Grained Setting., , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 605-635. Springer, (2019)Topology-Hiding Computation on All Graphs., , and . J. Cryptol., 33 (1): 176-227 (2020)Topology-Hiding Computation for Networks with Unknown Delays., , , , , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 215-245. Springer, (2020)