Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free., , , , , , and . IEEE Trans. Inf. Theory, 68 (12): 8197-8227 (2022)Squirrel: Efficient Synchronized Multi-Signatures from Lattices., , and . CCS, page 1109-1123. ACM, (2022)Compressing Encrypted Data Over Small Fields., , and . IACR Cryptol. ePrint Arch., (2023)FRIDA: Data Availability Sampling from FRI., , and . IACR Cryptol. ePrint Arch., (2024)On Sufficient Oracles for Secure Computation with Identifiable Abort., , and . IACR Cryptol. ePrint Arch., (2021)Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures., , , , , , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 510-539. Springer, (2019)The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free., , , , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 408-437. Springer, (2021)Continuously Non-malleable Codes with Split-State Refresh., , , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 121-139. Springer, (2018)Exponential Lower Bounds for Secret Sharing., and . IACR Cryptology ePrint Archive, (2019)Optimal Oblivious Priority Queues and Offline Oblivious RAM., , and . IACR Cryptology ePrint Archive, (2019)