Author of the publication

From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?

. ACM Conference on Computer and Communications Security, page 1-2. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic., , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 237-255. Springer, (2022)GDPR - Challenges for Reconciling Legal Rules with Technical Reality., , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 736-755. Springer, (2020)Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance., and . CSCML, volume 12716 of Lecture Notes in Computer Science, page 379-396. Springer, (2021)Bandwidth-Optimal Kleptographic Attacks., and . CHES, volume 2162 of Lecture Notes in Computer Science, page 235-250. Springer, (2001)A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes., , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 145-164. Springer, (2020)A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract), , and . FOCS, page 360-371. IEEE Computer Society, (1985)Lower Bounds for Pseudorandom Number Generators, , and . FOCS, page 242-247. IEEE Computer Society, (1989)Configuration and performance issues in the MetaNet design., , and . LCN, page 291-299. IEEE Computer Society, (1993)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , and . Cryptology and Network Security, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack., and . The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 243-255. Springer, (2016)