From post

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.

, и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 275-304. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Build Pseudorandom Functions from Public Random Permutations., , и . CRYPTO (1), том 11692 из Lecture Notes in Computer Science, стр. 266-293. Springer, (2019)Multi-user Security of the Elephant v2 Authenticated Encryption Mode., , , и . SAC, том 13203 из Lecture Notes in Computer Science, стр. 155-178. Springer, (2021)Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation., и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 275-304. Springer, (2021)A Modular Approach to the Security Analysis of Two-Permutation Constructions.. ASIACRYPT (1), том 13791 из Lecture Notes in Computer Science, стр. 379-409. Springer, (2022)Provably Secure Reflection Ciphers., и . CRYPTO (4), том 13510 из Lecture Notes in Computer Science, стр. 234-263. Springer, (2022)Improved Multi-user Security Using the Squared-Ratio Method., , и . CRYPTO (2), том 14082 из Lecture Notes in Computer Science, стр. 694-724. Springer, (2023)Categorization of Faulty Nonce Misuse Resistant Message Authentication., , и . ASIACRYPT (3), том 13092 из Lecture Notes in Computer Science, стр. 520-550. Springer, (2021)Information-Theoretic Security with Asymmetries., и . CRYPTO (4), том 14923 из Lecture Notes in Computer Science, стр. 463-494. Springer, (2024)