Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special Section on the Forty-Fifth Annual ACM Symposium on the Theory of Computing (STOC 2013)., , and . SIAM J. Comput., 45 (2): 459-460 (2016)On the Power of Nonlinear Secret-Sharing., and . IACR Cryptology ePrint Archive, (2001)Function Secret Sharing: Improvements and Extensions., , and . ACM Conference on Computer and Communications Security, page 1292-1303. ACM, (2016)Bounded Indistinguishability and the Complexity of Recovering Secrets., , , and . Electron. Colloquium Comput. Complex., (2015)Secure Multiparty Computation with Sublinear Preprocessing., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 427-457. Springer, (2022)Oblivious Transfer with Constant Computational Overhead., , , , , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 271-302. Springer, (2023)Function Secret Sharing., , and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 337-367. Springer, (2015)Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation., , , , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 871-900. Springer, (2021)Computationally Private Randomizing Polynomials and Their Applications., , and . CCC, page 260-274. IEEE Computer Society, (2005)Bounded Simultaneous Messages., , , , , and . FSTTCS, volume 284 of LIPIcs, page 23:1-23:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)