Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Perfectly-Secure Verifiable Secret-Sharing., , and . IACR Cryptol. ePrint Arch., (2021)Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality., , , and . IACR Cryptology ePrint Archive, (2008)Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network., , and . IACR Cryptology ePrint Archive, (2017)Asynchronous MPC with t<n/2 Using Non-equivocation., , , and . IACR Cryptology ePrint Archive, (2013)Linear Overhead Robust MPC with Honest Majority Using Preprocessing., , , and . IACR Cryptology ePrint Archive, (2015)Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 147-168. Springer, (2016)Brief Announcement: Almost-surely Terminating Asynchronous Byzantine Agreement Protocols with a Constant Expected Running Time.. PODC, page 169-171. ACM, (2020)Round efficient computationally secure multi-party computation revisited., , and . ICDCN, page 292-301. ACM, (2019)Crash-Tolerant Consensus in Directed Graph Revisited (Extended Abstract)., , , , and . SIROCCO, volume 11085 of Lecture Notes in Computer Science, page 55-71. Springer, (2018)High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract)., and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 832-855. Springer, (2020)