Author of the publication

Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives.

, , and . CRYPTO (1), volume 10401 of Lecture Notes in Computer Science, page 661-695. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limits on the Power of Garbling Techniques for Public-Key Encryption., , , and . IACR Cryptol. ePrint Arch., (2018)Data Poisoning Attacks in Multi-Party Learning., , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 4274-4283. PMLR, (2019)On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models., , and . TCC (A1), volume 9562 of Lecture Notes in Computer Science, page 18-48. Springer, (2016)Evaluating Adversarial Robustness of Secret Key-Based Defenses., , and . IEEE Access, (2022)Output stage of a dynamic current steering deep brain stimulator., , , and . ICECS, page 81-84. IEEE, (2015)On the Power of Hierarchical Identity-Based Encryption., and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 243-272. Springer, (2016)Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering., , and . NFV-SDN, page 57-63. IEEE, (2020)When Does Functional Encryption Imply Obfuscation?, , and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 82-115. Springer, (2017)Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives., , and . CRYPTO (1), volume 10401 of Lecture Notes in Computer Science, page 661-695. Springer, (2017)A fully integrated charge pump with double-loop control and differentiator-based transient enhancer for neural stimulation applications., , and . Microelectron. J., (2024)