Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandwidth-Efficient Transaction Relay for Bitcoin., , , , and . CoRR, (2019)Confidential Assets., , , , and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 43-63. Springer, (2018)Bulletproofs: Short Proofs for Confidential Transactions and More., , , , , and . IACR Cryptology ePrint Archive, (2017)An Introduction to Search Combinators., , , , and . LOPSTR, volume 7844 of Lecture Notes in Computer Science, page 2-16. Springer, (2012)Search Combinators, , , , and . CoRR, (2012)Bulletproofs: Short Proofs for Confidential Transactions and More., , , , , and . IEEE Symposium on Security and Privacy, page 315-334. IEEE Computer Society, (2018)Search combinators., , , , and . Constraints An Int. J., 18 (2): 269-305 (2013)Functional programming abstractions for CP modeling.. Ghent University, Belgium, (2011)base-search.net (ftunivgent:oai:archive.ugent.be:1971634).MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces., , , and . CCS, page 1717-1731. ACM, (2020)Erlay: Efficient Transaction Relay for Bitcoin., , , , and . CCS, page 817-831. ACM, (2019)