Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Party PSM, Revisited., and . IACR Cryptology ePrint Archive, (2019)Multi-party PSM, Revisited: - Improved Communication and Unbalanced Communication., and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 194-223. Springer, (2021)Reusable Non-Interactive Secure Computation., , , , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 462-488. Springer, (2019)On Basing Search SIVP on NP-Hardness.. IACR Cryptology ePrint Archive, (2016)Information-Theoretic 2-Round MPC Without Round Collapsing: Adaptive Security, and More., , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 502-531. Springer, (2020)Succinct Computational Secret Sharing., , , , , and . STOC, page 1553-1566. ACM, (2023)An end-to-end system to identify temporal relation in discharge summaries: 2012 i2b2 challenge., , , , and . J. Am. Medical Informatics Assoc., 20 (5): 849-858 (2013)How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations., and . IACR Cryptol. ePrint Arch., (2023)Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers., , , and . IACR Cryptol. ePrint Arch., (2024)The t-wise Independence of Substitution-Permutation Networks., , and . CRYPTO (4), volume 12828 of Lecture Notes in Computer Science, page 454-483. Springer, (2021)