Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crash-tolerant Consensus in Directed Graph Revisited., , , , and . IACR Cryptology ePrint Archive, (2018)Blazing Fast OT for Three-Round UC OT Extension., , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 299-327. Springer, (2020)Triply Adaptive UC NIZK., , and . IACR Cryptol. ePrint Arch., (2020)Reverse Firewalls for Adaptively Secure MPC Without Setup., , , and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 335-364. Springer, (2021)Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits., , , and . Public Key Cryptography (2), volume 10770 of Lecture Notes in Computer Science, page 499-529. Springer, (2018)Round-Optimal Oblivious Transfer and MPC from Computational CSIDH., , , , , and . IACR Cryptol. ePrint Arch., (2022)PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security., , and . IACR Cryptol. ePrint Arch., (2023)Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH., , , and . IACR Cryptol. ePrint Arch., (2023)CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks., , , , and . IACR Cryptol. ePrint Arch., (2023)Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security., , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 277-308. Springer, (2020)