Author of the publication

How to Construct a Leakage-Resilient (Stateless) Trusted Party.

, , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Computation and Probabilistic Checking.. Technion - Israel Institute of Technology, Israel, (2016)Probabilistically Checkable Proofs of Proximity with Zero-Knowledge., and . TCC, volume 8349 of Lecture Notes in Computer Science, page 121-145. Springer, (2014)Probabilistically Checkable Proofs of Proximity with Zero-Knowledge., and . IACR Cryptology ePrint Archive, (2017)Private Anonymous Data Access., , , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 244-273. Springer, (2019)Permuted Puzzles and Cryptographic Hardness., , and . TCC (2), volume 11892 of Lecture Notes in Computer Science, page 465-493. Springer, (2019)ZK-PCPs from Leakage-Resilient Secret Sharing., , and . J. Cryptol., 35 (4): 23 (2022)Linear-Regression on Packed Encrypted Data in the Two-Server Model., , , and . WAHC@CCS, page 21-32. ACM, (2019)Practical Solutions For Format-Preserving Encryption., , and . CoRR, (2015)Binary AMD Circuits from Secure Multiparty Computation., , and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 336-366. (2016)The Price of Active Security in Cryptographic Protocols., , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 184-215. Springer, (2020)