Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Commitment Capacity of Unfair Noisy Channels., , and . CoRR, (2019)Digital Signatures from Strong RSA without Prime Generation., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 217-235. Springer, (2015)On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries., and . CoRR, (2014)Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain., , , , , , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 25-45. Springer, (2022)Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption., , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 299-306. Springer, (2010)Standard Security Does Not Imply Security against Selective-Opening., , , and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 645-662. Springer, (2012)A Two-Party Protocol with Trusted Initializer for Computing the Inner Product., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 337-350. Springer, (2010)Privacy-Preserving Training of Tree Ensembles over Continuous Data., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)High Performance Logistic Regression for Privacy-Preserving Genome Analysis., , , , , and . CoRR, (2020)Do you know where your cloud files are?, , and . CCSW, page 73-82. ACM, (2011)