Author of the publication

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.

, , , and . IACR Cryptol. ePrint Arch., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable secret sharing in a total of three rounds.. Inf. Process. Lett., 112 (22): 856-859 (2012)Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission., , and . Theor. Comput. Sci., (2013)CoRA: Collaborative Risk-Aware Authentication., , , , and . IACR Cryptol. ePrint Arch., (2022)BETA: Biometric-Enabled Threshold Authentication., , , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 290-318. Springer, (2021)Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions., and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 30-61. (2017)On Fair Exchange, Fair Coins and Fair Sampling., and . CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, page 259-276. Springer, (2013)Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents., , and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 269-296. (2016)Towards a Unified Theory of Cryptographic Agents., , and . IACR Cryptol. ePrint Arch., (2014)Zether: Towards Privacy in a Smart Contract World., , , and . IACR Cryptology ePrint Archive, (2019)A Study of Pair Encodings: Predicate Encryption in Prime Order Groups., and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 259-288. Springer, (2016)