Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer., , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 505-523. Springer, (2009)Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast)., , , , and . IACR Cryptology ePrint Archive, (2019)Perennial secure multi-party computation of universal Turing machine., , , , and . Theor. Comput. Sci., (2019)Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)., , , , and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 69-83. Springer, (2013)Optimal Probabilistic Synchronous Byzantine Agreement.. Encyclopedia of Algorithms, (2016)Proofs of Work for Blockchain Protocols., , and . IACR Cryptology ePrint Archive, (2017)SoK: A Consensus Taxonomy in the Blockchain Era., and . IACR Cryptology ePrint Archive, (2018)MAC Precomputation with Applications to Secure Memory., , and . ACM Trans. Priv. Secur., 19 (2): 6:1-6:21 (2016)Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation., , , and . ICS, page 32-44. Tsinghua University Press, (2011)Efficient Agreement on Bounded-Degree Networks., and . ICPP (1), page 188-191. Pennsylvania State University Press, (1989)