From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Financially Backed Covert Security., , , и . Public Key Cryptography (2), том 13178 из Lecture Notes in Computer Science, стр. 99-129. Springer, (2022)Statement-Oblivious Threshold Witness Encryption., , , и . CSF, стр. 17-32. IEEE, (2023)Putting the Online Phase on a Diet: Covert Security from Short MACs., , , и . CT-RSA, том 13871 из Lecture Notes in Computer Science, стр. 360-386. Springer, (2023)Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Abstract)., , , , , и . ECOOP, том 222 из LIPIcs, стр. 35:1-35:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)POSE: Practical Off-chain Smart Contract Execution., , , , , , и . NDSS, The Internet Society, (2023)Generic Compiler for Publicly Verifiable Covert Multi-Party Computation., , , и . EUROCRYPT (2), том 12697 из Lecture Notes in Computer Science, стр. 782-811. Springer, (2021)