Author of the publication

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.

, , , and . IACR Cryptology ePrint Archive, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Actively Secure Five-Party Computation with Security Beyond Abort., , , and . ACM Conference on Computer and Communications Security, page 1573-1590. ACM, (2019)Gradual GRAM and Secure Computation for RAM Programs., and . SCN, volume 12238 of Lecture Notes in Computer Science, page 233-252. Springer, (2020)On the Power of Secure Two-Party Computation., and . J. Cryptol., 33 (1): 271-318 (2020)Efficient Set Operations in the Presence of Malicious Adversaries., and . J. Cryptol., 25 (3): 383-433 (2012)Secure Two-Party Computation with Low Communication., , and . IACR Cryptology ePrint Archive, (2011)Secure Two-Party Computation with Low Communication., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 54-74. Springer, (2012)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 323-341. Springer, (2007)Financially Backed Covert Security., , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 99-129. Springer, (2022)Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC., , , , and . CCS, page 1591-1605. ACM, (2020)Best of Both Worlds - Revisiting the Spymasters Double Agent Problem., , , and . CRYPTO (1), volume 14081 of Lecture Notes in Computer Science, page 328-359. Springer, (2023)