From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-Round Oblivious Linear Evaluation from Learning with Errors., , и . IACR Cryptol. ePrint Arch., (2020)Tight Verifiable Delay Functions., , , и . IACR Cryptol. ePrint Arch., (2019)Trapdoor Hash Functions and Their Applications., , , , , и . CRYPTO (3), том 11694 из Lecture Notes in Computer Science, стр. 3-32. Springer, (2019)Interaction-Preserving Compilers for Secure Computation., , , и . IACR Cryptol. ePrint Arch., (2021)Laconic Private Set Intersection and Applications., , , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 94-125. Springer, (2021)Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.. Public Key Cryptography, том 9020 из Lecture Notes in Computer Science, стр. 604-626. Springer, (2015)David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token., , и . IACR Cryptology ePrint Archive, (2012)Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model., , , , и . ICITS, том 10681 из Lecture Notes in Computer Science, стр. 1-25. Springer, (2017)Rate-1, Linear Time and Additively Homomorphic UC Commitments., , , , и . CRYPTO (3), том 9816 из Lecture Notes in Computer Science, стр. 179-207. Springer, (2016)Candidate iO from Homomorphic Encryption Schemes., , , и . EUROCRYPT (1), том 12105 из Lecture Notes in Computer Science, стр. 79-109. Springer, (2020)