Author of the publication

Reusable Two-Round MPC from DDH.

, , , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 320-348. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PKI-based Framework for Establishing Efficient MPC Channels., and . CCS, page 1961-1980. ACM, (2021)Round-Optimal Oblivious Transfer and MPC from Computational CSIDH., , , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 376-405. Springer, (2023)Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol., , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Endemic Oblivious Transfer., and . ACM Conference on Computer and Communications Security, page 309-326. ACM, (2019)Non-Observable Quantum Random Oracle Model., , and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 417-444. Springer, (2023)Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 626-642. Springer, (2022)Round-Optimal Oblivious Transfer and MPC from Computational CSIDH., , , , , and . IACR Cryptol. ePrint Arch., (2022)Two-Round Oblivious Transfer from CDH or LPN., , , , and . IACR Cryptol. ePrint Arch., (2019)Reusable Two-Round MPC from DDH., , , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 320-348. Springer, (2020)On Removing Rejection Conditions in Practical Lattice-Based Signatures., , and . PQCrypto, volume 12841 of Lecture Notes in Computer Science, page 380-398. Springer, (2021)