Author of the publication

K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures.

, , , , and . USENIX Security Symposium, USENIX Association, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BLOOM: Bimodal Lattice One-out-of-Many Proofs and Applications., and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 95-125. Springer, (2022)Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 215-241. Springer, (2021)DCASE 2018 task 2: iterative training, label smoothing, and background noise normalization for audio event tagging., , , and . DCASE, page 54-58. (2018)Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal., , , and . CCS, page 16-29. ACM, (2023)Greyhound: Fast Polynomial Commitments from Lattices., and . IACR Cryptol. ePrint Arch., (2024)Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency., , and . J. Cryptol., 37 (3): 31 (September 2024)Beauty Moment Rendering via Face Happiness Scoring., , , , , and . MAPR, page 1-5. IEEE, (2021)On Tightly Secure Primitives in the Multi-instance Setting., and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 581-611. Springer, (2019)Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures., , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 498-527. Springer, (2022)Lattice-Based Blind Signatures, Revisited., , , and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 500-529. Springer, (2020)