Author of the publication

Symmetric Primitives with Structured Secrets.

, , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 650-679. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH., , , and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 305-334. Springer, (2021)Cryptographic Group Actions and Applications., , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 411-439. Springer, (2020)Cryptographic Primitives with Hinting Property., and . J. Cryptol., 37 (3): 21 (September 2024)New (and Old) Proof Systems for Lattice Problems., , and . Public Key Cryptography (2), volume 10770 of Lecture Notes in Computer Science, page 619-643. Springer, (2018)Laconic Private Set Intersection and Applications., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 94-125. Springer, (2021)Symmetric Primitives with Structured Secrets., , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 650-679. Springer, (2019)Algebraic Frameworks for Cryptographic Primitives.. University of Michigan, USA, (2020)On Black-Box Verifiable Outsourcing., , , , and . TCC (1), volume 14369 of Lecture Notes in Computer Science, page 158-187. Springer, (2023)Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs., , and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 333-359. Springer, (2023)Cryptographic Primitives with Hinting Property., and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 33-62. Springer, (2022)