From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Communication-Computation Trade-offs in PIR., , , , , , и . IACR Cryptology ePrint Archive, (2019)Lower Bounds for (Batch) PIR with Private Preprocessing.. EUROCRYPT (1), том 14004 из Lecture Notes in Computer Science, стр. 518-550. Springer, (2023)Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications.. CRYPTO (4), том 14084 из Lecture Notes in Computer Science, стр. 197-230. Springer, (2023)Two Levels are Better than One: Dishonest Majority MPC with $O(|C|)$ Total Communication., и . IACR Cryptol. ePrint Arch., (2024)What Storage Access Privacy is Achievable with Small Overhead?, , и . PODS, стр. 182-199. ACM, (2019)SoK: SCT Auditing in Certificate Transparency., , , , , и . Proc. Priv. Enhancing Technol., 2022 (3): 336-353 (2022)Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing., , , и . ACM Conference on Computer and Communications Security, стр. 79-93. ACM, (2019)RSA Blind Signatures with Public Metadata., , и . IACR Cryptol. ePrint Arch., (2023)Forward Secret Encrypted RAM: Lower Bounds and Applications., , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 62-93. Springer, (2021)Don't be Dense: Efficient Keyword PIR for Sparse Databases., , и . USENIX Security Symposium, стр. 3853-3870. USENIX Association, (2023)