Author of the publication

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.

, , , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 114-134. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable Framework for Wireless Distributed Computing., , , and . CoRR, (2016)Coded distributed computing: Fundamental limits and practical challenges., , , and . ACSSC, page 509-513. IEEE, (2016)PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)A Systematic Approach Towards Efficient Private Matrix Multiplication., and . IEEE J. Sel. Areas Inf. Theory, 3 (2): 257-274 (2022)Communication-aware computing for edge processing., , and . ISIT, page 2885-2889. IEEE, (2017)Coded Merkle Tree: Solving Data Availability Attacks in Blockchains., , , , , and . IACR Cryptology ePrint Archive, (2019)Lagrange Coded Computing: Optimal Design for Resiliency, Security, and Privacy., , , , , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 1215-1225. PMLR, (2019)BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning., and . CoRR, (2024)Estimating Leaf Area Index with Dynamic Leaf Optical Properties., , , , , , , , and . Remote. Sens., 13 (23): 4898 (2021)Fedml: A research library and benchmark for federated machine learning, , , , , , , , , and 1 other author(s). arXiv preprint arXiv:2007.13518, (2020)