Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation., , , , , and . CoRR, (2018)Approximate parameterized matching., , and . ACM Trans. Algorithms, 3 (3): 29 (2007)Secure Two-Party Computation with Low Communication., , and . IACR Cryptology ePrint Archive, (2011)Secure Two-Party Computation with Low Communication., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 54-74. Springer, (2012)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 323-341. Springer, (2007)Outsourced pattern matching., , and . Int. J. Inf. Sec., 17 (3): 327-346 (2018)Two-Dimensional Parameterized Matching., , , and . ACM Trans. Algorithms, 11 (2): 12:1-12:30 (2014)The Price of Active Security in Cryptographic Protocols., , and . IACR Cryptology ePrint Archive, (2019)Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary., , , , , , , and . CoRR, (2023)Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs., , and . IACR Cryptol. ePrint Arch., (2022)