Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Multiparty Computation with Free Branching., , , and . IACR Cryptol. ePrint Arch., (2023)Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions., , , and . EUROCRYPT (2), volume 14005 of Lecture Notes in Computer Science, page 347-378. Springer, (2023)Generating Graphs Packed with Paths., and . IACR Cryptology ePrint Archive, (2018)nQUIC: Noise-Based QUIC Packet Protection., , , and . EPIQ@CoNEXT, page 22-28. ACM, (2018)Stacking Sigmas: A Framework to Compose $\varSigma $-Protocols for Disjunctions., , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 458-487. Springer, (2022)On Valiant's Conjecture - Impossibility of Incrementally Verifiable Computation from Random Oracles., and . EUROCRYPT (2), volume 14005 of Lecture Notes in Computer Science, page 438-469. Springer, (2023)Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions., and . AsiaCCS, page 652-666. ACM, (2022)FRIDA: Data Availability Sampling from FRI., , and . CRYPTO (6), volume 14925 of Lecture Notes in Computer Science, page 289-324. Springer, (2024)Automated Analysis of Halo2 Circuits., , , , , and . SMT, volume 3429 of CEUR Workshop Proceedings, page 3-17. CEUR-WS.org, (2023)Curve Trees: Practical and Transparent Zero-Knowledge Accumulators., , and . USENIX Security Symposium, page 4391-4408. USENIX Association, (2023)