Author of the publication

Round efficient computationally secure multi-party computation revisited.

, , and . ICDCN, page 292-301. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious Secure, Structure-Aware Private Set Intersection., , and . CRYPTO (1), volume 14081 of Lecture Notes in Computer Science, page 577-610. Springer, (2023)Brief Announcement: Crash-Tolerant Consensus in Directed Graph Revisited., , , , and . DISC, volume 91 of LIPIcs, page 46:1-46:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Private Set Operations from Oblivious Switching., , , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 591-617. Springer, (2021)Real Time Twitter Based Disaster Response System for Indian Scenarios., , , and . HiPC Workshops, page 82-86. IEEE, (2019)Oblivious Key-Value Stores and Amplification for Private Set Intersection., , , , and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 395-425. Springer, (2021)Round efficient computationally secure multi-party computation revisited., , and . ICDCN, page 292-301. ACM, (2019)Crash-Tolerant Consensus in Directed Graph Revisited (Extended Abstract)., , , , and . SIROCCO, volume 11085 of Lecture Notes in Computer Science, page 55-71. Springer, (2018)Secret-Shared Joins with Multiplicity from Aggregation Trees., , , , and . CCS, page 209-222. ACM, (2022)Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching., , and . CRYPTO (1), volume 13507 of Lecture Notes in Computer Science, page 323-352. Springer, (2022)