Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coin Flipping with Constant Bias Implies One-Way Functions., and . SIAM J. Comput., 43 (2): 389-409 (2014)From Fairness to Full Security in Multiparty Computation., , , and . J. Cryptol., 35 (1): 4 (2022)1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds., , , and . J. Cryptol., 33 (4): 1659-1731 (2020)Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols., , , , and . CoRR, (2021)PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection., , , and . IACR Cryptol. ePrint Arch., (2021)On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness., , , , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 532-561. Springer, (2022)Characterization of Secure Multiparty Computation Without Broadcast., , , and . TCC (A1), volume 9562 of Lecture Notes in Computer Science, page 596-616. Springer, (2016)Distributed Private Data Analysis: Simultaneously Solving How and What., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 451-468. Springer, (2008)Protocols for Multiparty Coin Toss with Dishonest Majority., , and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 538-557. Springer, (2010)Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing., , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 530-549. Springer, (2019)