Author of the publication

It Wasn't Me! - Repudiability and Claimability of Ring Signatures.

, and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 159-190. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographically blinded games: leveraging players' limitations for equilibria and profit., and . EC, page 207-208. ACM, (2014)How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts., , , and . ITCS, volume 124 of LIPIcs, page 42:1-42:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)It Wasn't Me! - Repudiability and Claimability of Ring Signatures., and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 159-190. Springer, (2019)SpaceMint: A Cryptocurrency Based on Proofs of Space., , , , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 480-499. Springer, (2018)Practical Accountability of Secret Processes., , , , and . USENIX Security Symposium, page 657-674. USENIX Association, (2018)Cryptography, Trust and Privacy: It's Complicated., , and . CSLAW, page 167-179. ACM, (2022)The Superlinearity Problem in Post-quantum Blockchains., and . FC (1), volume 13950 of Lecture Notes in Computer Science, page 200-217. Springer, (2023)Fully Deniable Interactive Encryption., , and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 807-835. Springer, (2020)Data structures meet cryptography: 3SUM with preprocessing., , , , and . STOC, page 294-307. ACM, (2020)Towards Optimally Efficient Secret-Key Authentication from PRG., and . IACR Cryptology ePrint Archive, (2014)