Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coupled Schema Transformation and Data Conversion for XML and SQL., , , and . PADL, volume 4354 of Lecture Notes in Computer Science, page 290-304. Springer, (2007)Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head., , , , , and . CoRR, (2021)Jasmin: High-Assurance and High-Speed Cryptography., , , , , , , , , and . CCS, page 1807-1823. ACM, (2017)Formally verifying Kyber Episode IV: Implementation correctness., , , , , , , , , and 2 other author(s). IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (3): 164-193 (2023)Calculating with lenses: optimising bidirectional transformations., and . PEPM, page 91-100. ACM, (2011)BiFluX: A Bidirectional Functional Update Language for XML., , and . PPDP, page 147-158. ACM, (2014)Bidirectional data transformation by calculation. University of Minho, Portugal, (2012)Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head., , , , , , and . CCS, page 2587-2600. ACM, (2021)A formal treatment of the role of verified compilers in secure computation., , , , , and . J. Log. Algebraic Methods Program., (2022)Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks., , , , , and . CSF, page 132-146. IEEE Computer Society, (2018)