Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How To Bootstrap Anonymous Communication., and . ITCS, page 333-344. ACM, (2016)Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution., , , , and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 595-626. Springer, (2018)Cryptogenography: anonymity without trust.. Queen Mary University of London, UK, (2016)British Library, EThOS.Information Theoretical Cryptogenography.. ICALP (1), volume 8572 of Lecture Notes in Computer Science, page 676-688. Springer, (2014)Timeability of Extensive-Form Games., , and . ITCS, page 191-199. ACM, (2016)A Numbers-on-Foreheads Game.. MFCS (2), volume 9235 of Lecture Notes in Computer Science, page 420-431. Springer, (2015)Timeability of Extensive-Form Games., , and . CoRR, (2015)Cryptogenography., , , and . ITCS, page 13-22. ACM, (2014)