Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SnarkPack: Practical SNARK Aggregation., , and . Financial Cryptography, volume 13411 of Lecture Notes in Computer Science, page 203-229. Springer, (2022)Rinocchio: SNARKs for Ring Arithmetic., , and . IACR Cryptol. ePrint Arch., (2021)Robust Password-Protected Secret Sharing., , , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 61-79. Springer, (2016)Rinocchio: SNARKs for Ring Arithmetic., , and . J. Cryptol., 36 (4): 41 (October 2023)Caulk: Lookup Arguments in Sublinear Time., , , , , and . CCS, page 3121-3134. ACM, (2022)What Makes Fiat-Shamir zkSNARKs (Updatable SRS) Simulation Extractable?, , , , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 735-760. Springer, (2022)A tale of SNARKs: quantum resilience, knowledge extractability and data privacy. (Un recueil de SNARKs: sécurité quantique, extractabilité et confidentialité des données).. École Normale Supérieure, Paris, France, (2019)Linear-Map Vector Commitments and Their Practical Applications., , , , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 189-219. Springer, (2022)MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation., , , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 663-686. Springer, (2022)Boosting Verifiable Computation on Encrypted Data., , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 124-154. Springer, (2020)