From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Disjunctions for Hash Proof Systems: New Constructions and Applications., , и . IACR Cryptology ePrint Archive, (2014)Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks., , и . IET Inf. Secur., 14 (3): 365-366 (2020)On the Local Leakage Resilience of Linear Secret Sharing Schemes., , , и . CRYPTO (1), том 10991 из Lecture Notes in Computer Science, стр. 531-561. Springer, (2018)Removing Erasures with Explainable Hash Proof Systems., , и . Public Key Cryptography (1), том 10174 из Lecture Notes in Computer Science, стр. 151-174. Springer, (2017)Weighted Secret Sharing from Wiretap Channels., , и . IACR Cryptol. ePrint Arch., (2022)Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation., , , , , и . TCC (2), том 13043 из Lecture Notes in Computer Science, стр. 129-161. Springer, (2021)Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions., , , и . TCC (1), том 11239 из Lecture Notes in Computer Science, стр. 175-205. Springer, (2018)FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning., , , , , и . CoRR, (2020)On the (in)security of ROS., , , и . IACR Cryptol. ePrint Arch., (2020)On the Tightness of Forward-Secure Signature Reductions., , и . J. Cryptol., 32 (1): 84-150 (2019)