Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution., , , , and . IACR Cryptology ePrint Archive, (2018)Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution., , , , and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 595-626. Springer, (2018)How To Bootstrap Anonymous Communication., and . ITCS, page 333-344. ACM, (2016)Timeability of Extensive-Form Games., , and . CoRR, (2015)Information Theoretical Cryptogenography.. J. Cryptol., 30 (4): 1067-1115 (2017)Cryptogenography., , , and . ITCS, page 13-22. ACM, (2014)Mutual Information Matrices Are Not Always Positive Semidefinite.. IEEE Trans. Inf. Theory, 60 (5): 2694-2696 (2014)Cryptogenography: anonymity without trust.. Queen Mary University of London, UK, (2016)British Library, EThOS.Information Theoretical Cryptogenography.. ICALP (1), volume 8572 of Lecture Notes in Computer Science, page 676-688. Springer, (2014)Timeability of Extensive-Form Games., , and . ITCS, page 191-199. ACM, (2016)