Author of the publication

Putting the Online Phase on a Diet: Covert Security from Short MACs.

, , , and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 360-386. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Two-Party Computation with Low Communication., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 54-74. Springer, (2012)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 323-341. Springer, (2007)Secure Two-Party Computation with Low Communication., , and . IACR Cryptology ePrint Archive, (2011)Gradual GRAM and Secure Computation for RAM Programs., and . SCN, volume 12238 of Lecture Notes in Computer Science, page 233-252. Springer, (2020)On the Power of Secure Two-Party Computation., and . J. Cryptol., 33 (1): 271-318 (2020)Efficient Set Operations in the Presence of Malicious Adversaries., and . J. Cryptol., 25 (3): 383-433 (2012)Fast Actively Secure Five-Party Computation with Security Beyond Abort., , , and . ACM Conference on Computer and Communications Security, page 1573-1590. ACM, (2019)ZK-PCPs from Leakage-Resilient Secret Sharing., , and . ITC, volume 199 of LIPIcs, page 6:1-6:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs., , and . TCC (1), volume 14369 of Lecture Notes in Computer Science, page 3-33. Springer, (2023)Financially Backed Covert Security., , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 99-129. Springer, (2022)