Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Balls and Bins: Smaller Hash Families and Faster Evaluation., , , and . SIAM J. Comput., 42 (3): 1030-1050 (2013)Public-Key Cryptosystems Resilient to Key Leakage., and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 18-35. Springer, (2009)History-Independent Cuckoo Hashing., , and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 631-642. Springer, (2008)From Minicrypt to Obfustopia via Private-Key Functional Encryption., and . EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 122-151. (2017)Chosen-Ciphertext Security via Correlated Products., and . TCC, volume 5444 of Lecture Notes in Computer Science, page 419-436. Springer, (2009)Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions., , , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 559-578. Springer, (2011)Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption., and . IACR Cryptology ePrint Archive, (2008)A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval., , and . IACR Cryptology ePrint Archive, (2007)Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models., , and . IEEE Trans. Inf. Theory, 54 (6): 2408-2425 (2008)The Security of Lazy Users in Out-of-Band Authentication., , and . ACM Trans. Priv. Secur., 23 (2): 9:1-9:32 (2020)