Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Sustainability of Blockchain Funding., and . ICDM Workshops, page 89-96. IEEE, (2018)Proof-Carrying Cloud Computation: The Case of Convex Optimization., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1790-1803 (2014)An Efficient E2E Verifiable E-voting System without Setup Assumptions., , and . IEEE Secur. Priv., 15 (3): 14-23 (2017)PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices., , , , , and . Future Gener. Comput. Syst., (2022)Publicly auditable conditional blind signatures., , , and . J. Comput. Secur., 29 (2): 229-271 (2021)Fine-grained Policy Constraints for Distributed Point Function., , and . IACR Cryptol. ePrint Arch., (2023)Practical Constructions for Single Input Functionality against a Dishonest Majority., , , and . IACR Cryptol. ePrint Arch., (2023)Secure Computation for G-Module and its Applications., , , , and . IACR Cryptol. ePrint Arch., (2021)UC Secure Private Branching Program and Decision Tree Evaluation., , , , and . IACR Cryptol. ePrint Arch., (2021)GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility., , , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 129-158. Springer, (2022)