Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degree 2 is Complete for the Round-Complexity of Malicious MPC., , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 504-531. Springer, (2019)On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings., and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 449-477. Springer, (2016)Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys., , , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 166-184. Springer, (2013)Randomly Encoding Functions: A New Cryptographic Paradigm - (Invited Talk).. ICITS, volume 6673 of Lecture Notes in Computer Science, page 25-31. Springer, (2011)Obfuscating Circuits via Composite-Order Graded Encoding., and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 528-556. Springer, (2015)Correction: Locally Computable UOWHF with Linear Shrinkage., and . J. Cryptol., 36 (2): 5 (April 2023)Placing Conditional Disclosure of Secrets in the Communication Complexity Universe., and . J. Cryptol., 34 (2): 11 (2021)Algebraic Attacks against Random Local Functions and Their Countermeasures., and . Electron. Colloquium Comput. Complex., (2015)Locally Computable UOWHF with Linear Shrinkage., and . Electron. Colloquium Comput. Complex., (2013)Placing Conditional Disclosure of Secrets in the Communication Complexity Universe., and . Electron. Colloquium Comput. Complex., (2018)