From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gradual GRAM and Secure Computation for RAM Programs., и . SCN, том 12238 из Lecture Notes in Computer Science, стр. 233-252. Springer, (2020)On the Power of Secure Two-Party Computation., и . J. Cryptol., 33 (1): 271-318 (2020)Efficient Set Operations in the Presence of Malicious Adversaries., и . J. Cryptol., 25 (3): 383-433 (2012)Fast Actively Secure Five-Party Computation with Security Beyond Abort., , , и . ACM Conference on Computer and Communications Security, стр. 1573-1590. ACM, (2019)Financially Backed Covert Security., , , и . Public Key Cryptography (2), том 13178 из Lecture Notes in Computer Science, стр. 99-129. Springer, (2022)Secure Two-Party Computation with Low Communication., , и . IACR Cryptology ePrint Archive, (2011)Secure Two-Party Computation with Low Communication., , и . TCC, том 7194 из Lecture Notes in Computer Science, стр. 54-74. Springer, (2012)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , и . TCC, том 4392 из Lecture Notes in Computer Science, стр. 323-341. Springer, (2007)Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC., , , , и . CCS, стр. 1591-1605. ACM, (2020)Best of Both Worlds - Revisiting the Spymasters Double Agent Problem., , , и . CRYPTO (1), том 14081 из Lecture Notes in Computer Science, стр. 328-359. Springer, (2023)