Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA., and . IACR Cryptology ePrint Archive, (2019)Private Signaling., , , , and . IACR Cryptol. ePrint Arch., (2021)Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users., , , and . DAPPS, page 69-78. IEEE, (2021)The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications., , and . IACR Cryptol. ePrint Arch., (2021)The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?, , and . Financial Cryptography, volume 13411 of Lecture Notes in Computer Science, page 123-148. Springer, (2022)A Note on Low Order Assumptions in RSA groups., and . IACR Cryptology ePrint Archive, (2020)Anonymity Analysis of the Umbra Stealth Address Scheme on Ethereum., and . CoRR, (2023)ethp2psim: Evaluating and deploying privacy-enhanced peer-to-peer routing protocols for the Ethereum network., , , and . CoRR, (2023)Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash., , , , , , , , , and 2 other author(s). CoRR, (2022)How (not) to hash into class groups of imaginary quadratic fields?, , and . IACR Cryptol. ePrint Arch., (2024)