Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries., and . CoRR, (2014)On the Commitment Capacity of Unfair Noisy Channels., , and . CoRR, (2019)Digital Signatures from Strong RSA without Prime Generation., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 217-235. Springer, (2015)Standard Security Does Not Imply Security against Selective-Opening., , , and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 645-662. Springer, (2012)Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain., , , , , , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 25-45. Springer, (2022)Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption., , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 299-306. Springer, (2010)A Two-Party Protocol with Trusted Initializer for Computing the Inner Product., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 337-350. Springer, (2010)Insured MPC: Efficient Secure Computation with Financial Penalties., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 404-420. Springer, (2020)How Secure is Deterministic Encryption?, , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 52-73. Springer, (2015)Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 500-519. Springer, (2018)