Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ZK-PCPs from Leakage-Resilient Secret Sharing., , and . ITC, volume 199 of LIPIcs, page 6:1-6:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs., , and . TCC (1), volume 14369 of Lecture Notes in Computer Science, page 3-33. Springer, (2023)Financially Backed Covert Security., , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 99-129. Springer, (2022)Secure Two-Party Computation with Low Communication., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 54-74. Springer, (2012)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 323-341. Springer, (2007)Best of Both Worlds - Revisiting the Spymasters Double Agent Problem., , , and . CRYPTO (1), volume 14081 of Lecture Notes in Computer Science, page 328-359. Springer, (2023)Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC., , , , and . CCS, page 1591-1605. ACM, (2020)Secure Two-Party Computation with Low Communication., , and . IACR Cryptology ePrint Archive, (2011)On the Power of Secure Two-Party Computation., and . J. Cryptol., 33 (1): 271-318 (2020)Efficient Set Operations in the Presence of Malicious Adversaries., and . J. Cryptol., 25 (3): 383-433 (2012)