Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS., , , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 73-88. Springer, (2013)Multi-mode Cryptocurrency Systems., , and . BCC@AsiaCCS, page 35-46. ACM, (2018)Fractal: A New Paradigm for High-Performance Proof-of-Stake Blockchains.. SCC@AsiaCCS, page 3. ACM, (2019)Secure Function Collection with Sublinear Storage., , , and . ICALP (2), volume 5556 of Lecture Notes in Computer Science, page 534-545. Springer, (2009)Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware., , and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 131-158. Springer, (2015)Generic Semantic Security against a Kleptographic Adversary., , , and . CCS, page 907-922. ACM, (2017)Cliptography: Clipping the Power of Kleptographic Attacks., , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 34-64. (2016)Trading Static for Adaptive Security in Universally Composable Zero-Knowledge., and . ICALP, volume 4596 of Lecture Notes in Computer Science, page 316-327. Springer, (2007)The Ideal Functionalities for Private Set Union, Revisited., , , and . IACR Cryptol. ePrint Arch., (2022)2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely., , , , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 697-712. Springer, (2020)