From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols., , , , и . CoRR, (2021)PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection., , , и . IACR Cryptol. ePrint Arch., (2021)From Fairness to Full Security in Multiparty Computation., , , и . J. Cryptol., 35 (1): 4 (2022)1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds., , , и . J. Cryptol., 33 (4): 1659-1731 (2020)Coin Flipping with Constant Bias Implies One-Way Functions., и . SIAM J. Comput., 43 (2): 389-409 (2014)On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness., , , , и . TCC (2), том 13748 из Lecture Notes in Computer Science, стр. 532-561. Springer, (2022)Characterization of Secure Multiparty Computation Without Broadcast., , , и . TCC (A1), том 9562 из Lecture Notes in Computer Science, стр. 596-616. Springer, (2016)MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably., , , и . CRYPTO (8), том 14927 из Lecture Notes in Computer Science, стр. 74-108. Springer, (2024)Optimizing Budget Allocation in Graphs., , и . CCCG, (2011)Characterization of Secure Multiparty Computation Without Broadcast., , , и . J. Cryptol., 31 (2): 587-609 (2018)