From post

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.

, , , , , , и . ITC, том 230 из LIPIcs, стр. 16:1-16:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimally-secure Coin-tossing against a Byzantine Adversary., , и . ISIT, стр. 2858-2863. IEEE, (2021)Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness., , и . TCC (2), том 11892 из Lecture Notes in Computer Science, стр. 333-355. Springer, (2019)Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)., , , и . TCC (2), том 11240 из Lecture Notes in Computer Science, стр. 36-65. Springer, (2018)Secure Non-interactive Simulation from Arbitrary Joint Distributions., , и . TCC (2), том 13748 из Lecture Notes in Computer Science, стр. 378-407. Springer, (2022)Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields., , , и . EUROCRYPT (4), том 14654 из Lecture Notes in Computer Science, стр. 286-315. Springer, (2024)Exploring the Limits of Common Coins Using Frontier Analysis of Protocols., , , и . TCC, том 6597 из Lecture Notes in Computer Science, стр. 486-503. Springer, (2011)On the Power of Public-Key Encryption in Secure Computation., , и . TCC, том 8349 из Lecture Notes in Computer Science, стр. 240-264. Springer, (2014)On the Power of Public-key Encryption in Secure Computation., , и . Electron. Colloquium Comput. Complex., (2013)Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family., , , , , , и . TCC (1), том 13747 из Lecture Notes in Computer Science, стр. 355-383. Springer, (2022)Efficient Distributed Coin-tossing Protocols., , , и . ISIT, стр. 2852-2857. IEEE, (2021)