Author of the publication

Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol.

, , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 343-367. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 216-232. Springer, (2012)Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol., , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 343-367. Springer, (2014)Meta-envy-free Cake-cutting and Pie-cutting Protocols., and . J. Inf. Process., 20 (3): 686-693 (2012)Fault-Tolerant Routings in a kappa-Connected Network., and . Inf. Process. Lett., 28 (4): 171-175 (1988)Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players., and . SECITC, volume 12596 of Lecture Notes in Computer Science, page 55-70. Springer, (2020)Card-Based Zero-Knowledge Proof for the Nearest Neighbor Property: Zero-Knowledge Proof of ABC End View., and . SPACE, volume 13783 of Lecture Notes in Computer Science, page 147-161. Springer, (2022)Free-XOR in Card-Based Garbled Circuits., and . CANS, volume 14342 of Lecture Notes in Computer Science, page 232-248. Springer, (2023)Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations., and . DPM/CBT@ESORICS, volume 11737 of Lecture Notes in Computer Science, page 156-173. Springer, (2019)Many-to-many perfect matching., and . AISS, page 4:1-4:7. ACM, (2022)A feasibility decision algorithm for rate monotonic scheduling of periodic real-time tasks., and . IEEE Real Time Technology and Applications Symposium, page 212-218. IEEE Computer Society, (1995)