Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally Composable Accumulators., , and . IACR Cryptology ePrint Archive, (2018)Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures., , and . IET Inf. Secur., 15 (3): 205-222 (2021)TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub., , , , and . NDSS, The Internet Society, (2017)Truncator: Time-space Tradeoff of Cryptographic Primitives., , , and . IACR Cryptol. ePrint Arch., (2022)Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions., , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 244-267. Springer, (2022)gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies., , , , and . IACR Cryptol. ePrint Arch., (2022)Efficient Noninteractive Certification of RSA Moduli and Beyond., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 700-727. Springer, (2019)Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols., , , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 227-238. Springer, (2007)Anonymous Transferable E-Cash., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 101-124. Springer, (2015)Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation., , , , , , , , , and 2 other author(s). IEEE Trans. Syst. Man Cybern. Syst., 50 (1): 2-8 (2020)