Author of the publication

Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations.

, , , and . CRYPTO (1), volume 10401 of Lecture Notes in Computer Science, page 727-757. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-valued Byzantine Broadcast: The t < n Case., and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 448-465. Springer, (2014)Multi-Valued Byzantine Broadcast: the t<n Case., and . IACR Cryptology ePrint Archive, (2013)Broadcast Amplification., , and . IACR Cryptology ePrint Archive, (2013)Byzantine Fault-Tolerance with Commutative Commands., , and . OPODIS, volume 7109 of Lecture Notes in Computer Science, page 329-342. Springer, (2011)Key-Indistinguishable Message Authentication Codes., , , , and . SCN, volume 8642 of Lecture Notes in Computer Science, page 476-493. Springer, (2014)Fast Pseudorandom Functions Based on Expander Graphs., and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 27-56. (2016)An Optimal Algorithm for Sliding Window Order Statistics.. ICDT, volume 255 of LIPIcs, page 5:1-5:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations., , , and . CRYPTO (1), volume 10401 of Lecture Notes in Computer Science, page 727-757. Springer, (2017)Broadcast from Minicast Secure Against General Adversaries.. ICALP (2), volume 9135 of Lecture Notes in Computer Science, page 701-712. Springer, (2015)On the Complexity of Broadcast Setup., and . ICALP (1), volume 7965 of Lecture Notes in Computer Science, page 552-563. Springer, (2013)