Author of the publication

Efficient Two Party and Multi Party Computation Against Covert Adversaries.

, , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 289-306. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Positive Results for Concurrently Secure Computation in the Plain Model.. IACR Cryptology ePrint Archive, (2011)Constant Round Non-Malleable Protocols using One Way Functions.. IACR Cryptology ePrint Archive, (2010)Vcache: Caching Dynamic Documents, , and . CoRR, (2010)Storing and Retrieving Secrets on a Blockchain., , , , and . IACR Cryptol. ePrint Arch., (2020)Nonmalleable Extractors and Codes, with Their Many Tampered Extensions., , and . SIAM J. Comput., 49 (5): 999-1040 (2020)Unclonable Commitments and Proofs., , and . IACR Cryptol. ePrint Arch., (2023)Interaction-Preserving Compilers for Secure Computation., , , and . IACR Cryptol. ePrint Arch., (2021)Non-malleable Secret Sharing for General Access Structures., and . CRYPTO (1), volume 10991 of Lecture Notes in Computer Science, page 501-530. Springer, (2018)Correlated-Source Extractors and Cryptography with Correlated-Random Tapes., and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 562-592. Springer, (2019)Asymmetric Multi-Party Computation., , and . ITC, volume 267 of LIPIcs, page 6:1-6:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)