Author of the publication

Confidential Assets.

, , , , and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 43-63. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Introduction to Search Combinators., , , , and . LOPSTR, volume 7844 of Lecture Notes in Computer Science, page 2-16. Springer, (2012)Bandwidth-Efficient Transaction Relay for Bitcoin., , , , and . CoRR, (2019)Confidential Assets., , , , and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 43-63. Springer, (2018)Functional programming abstractions for CP modeling.. Ghent University, Belgium, (2011)base-search.net (ftunivgent:oai:archive.ugent.be:1971634).Bulletproofs: Short Proofs for Confidential Transactions and More., , , , , and . IEEE Symposium on Security and Privacy, page 315-334. IEEE Computer Society, (2018)Search Combinators., , , , and . CP, volume 6876 of Lecture Notes in Computer Science, page 774-788. Springer, (2011)Parameterized Models for On-Line and Off-Line Use., and . WFLP, volume 6559 of Lecture Notes in Computer Science, page 101-118. Springer, (2010)Erlay: Efficient Transaction Relay for Bitcoin., , , , and . CCS, page 817-831. ACM, (2019)MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces., , , and . CCS, page 1717-1731. ACM, (2020)FLIF: Free lossless image format based on MANIAC compression., and . ICIP, page 66-70. IEEE, (2016)