Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking Cryptographic Capabilities., , , , and . SIAM J. Comput., 47 (6): 2157-2202 (2018)Rate-1 Non-Interactive Arguments for Batch-NP and Applications., , , and . FOCS, page 1057-1068. IEEE, (2022)Planting Undetectable Backdoors in Machine Learning Models., , , and . CoRR, (2022)SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption., , and . IACR Cryptol. ePrint Arch., (2022)One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval., , , , and . IACR Cryptol. ePrint Arch., (2022)Lattice Problems beyond Polynomial Time., , , , , , , , and . STOC, page 1516-1526. ACM, (2023)Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs., and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 632-651. Springer, (2020)Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation., , , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 55-80. Springer, (2019)Lattice Trapdoors and IBE from Middle-Product LWE., , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 24-54. Springer, (2019)A system capable of verifiably and privately screening global DNA synthesis., , , , , , , , , and 20 other author(s). CoRR, (2024)