From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Two-Party Computation with Low Communication., , и . IACR Cryptology ePrint Archive, (2011)Fast Actively Secure Five-Party Computation with Security Beyond Abort., , , и . ACM Conference on Computer and Communications Security, стр. 1573-1590. ACM, (2019)Gradual GRAM and Secure Computation for RAM Programs., и . SCN, том 12238 из Lecture Notes in Computer Science, стр. 233-252. Springer, (2020)On the Power of Secure Two-Party Computation., и . J. Cryptol., 33 (1): 271-318 (2020)Efficient Set Operations in the Presence of Malicious Adversaries., и . J. Cryptol., 25 (3): 383-433 (2012)Secure Two-Party Computation with Low Communication., , и . TCC, том 7194 из Lecture Notes in Computer Science, стр. 54-74. Springer, (2012)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , и . TCC, том 4392 из Lecture Notes in Computer Science, стр. 323-341. Springer, (2007)ZK-PCPs from Leakage-Resilient Secret Sharing., , и . ITC, том 199 из LIPIcs, стр. 6:1-6:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs., , и . TCC (1), том 14369 из Lecture Notes in Computer Science, стр. 3-33. Springer, (2023)Best of Both Worlds - Revisiting the Spymasters Double Agent Problem., , , и . CRYPTO (1), том 14081 из Lecture Notes in Computer Science, стр. 328-359. Springer, (2023)