Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally Verifiable MPC and IRV Ballot Counting., , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 301-319. Springer, (2019)Separations in Circular Security for Arbitrary Length Key Cycles., , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 378-400. Springer, (2015)Shuffle-sum: coercion-resistant verifiable tallying for STV voting., , , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 685-698 (2009)Coercion-Resistant Tallying for STV Voting., , and . EVT, USENIX Association, (2008)Detecting General Algebraic Manipulation Attacks.. IACR Cryptology ePrint Archive, (2017)Efficiently Shuffling in Public., , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 431-448. Springer, (2012)Parallel Shuffling and Its Application to Prêt à Voter.. EVT/WOTE, USENIX Association, (2010)Privacy preserving protocols for large distributed systems.. University of Melbourne, Parkville, Victoria, Australia, (2017)base-search.net (ftumelbourne:oai:jupiter.its.unimelb.edu.au:11343/234230).Separations in Circular Security for Arbitrary Length Key Cycles., , and . IACR Cryptology ePrint Archive, (2013)Privately Matching k-mers., , , and . IACR Cryptology ePrint Archive, (2016)