Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Round Oblivious Linear Evaluation from Learning with Errors., , and . IACR Cryptol. ePrint Arch., (2020)Laconic Private Set Intersection and Applications., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 94-125. Springer, (2021)Emotional interaction.. CHI Extended Abstracts, page 676-677. ACM, (2003)Blink: observing thin slices of behavior to determine users' expectation towards task difficulty., , , , , , and . CHI Extended Abstracts, page 2299-2304. ACM, (2011)Game-based interaction technology for informal education in public settings., , , , , , and . SIGGRAPH Educators Program, page 23. ACM, (2005)Studydesk: semi-immersive volumetric data analysis., , , , and . GRAPHITE, page 251-252. ACM, (2003)Challenges for multimodal interfaces towards anyone anywhere accessibility: a position paper.. Workshop on Universal Accessibility of Ubiquitous Computing, page 26-27. ACM, (2001)Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption., , , and . IACR Cryptology ePrint Archive, (2018)UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions., , and . IACR Cryptology ePrint Archive, (2019)A Traceable Ring Signature Scheme Based on Coding Theory., and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 387-403. Springer, (2019)