Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient FPGA Implementations of LowMC and Picnic., , , , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 417-441. Springer, (2020)From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 255-286. Springer, (2023)Reinforced Concrete: A Fast Hash Function for Verifiable Computation., , , , , and . CCS, page 1323-1335. ACM, (2022)Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System., , , , and . CoRR, (2024)Privately Connecting Mobility to Infectious Diseases via Applied Cryptography., , , , , and . Proc. Priv. Enhancing Technol., 2022 (4): 768-788 (2022)Efficient FPGA Implementations of LowMC and Picnic., , , , and . IACR Cryptology ePrint Archive, (2019)Multi-party Revocation in Sovrin: Performance through Distributed Trust., , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 527-551. Springer, (2021)Multi-Party Revocation in Sovrin: Performance through Distributed Trust., , , and . IACR Cryptol. ePrint Arch., (2020)Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 573-606. Springer, (2023)