Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Bayes-Nash Equilibria in Combinatorial Auctions with Verification., , , and . J. Artif. Intell. Res., (2020)Non-Interactive Differentially Anonymous Router., , , and . IACR Cryptol. ePrint Arch., (2021)Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains., , and . IACR Cryptology ePrint Archive, (2018)Transparent SNARKs from DARK Compilers., , and . IACR Cryptology ePrint Archive, (2019)Protostar: Generic Efficient Accumulation/Folding for Special-Sound Protocols., and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 77-110. Springer, (2023)Bulletproofs: Short Proofs for Confidential Transactions and More., , , , , and . IEEE Symposium on Security and Privacy, page 315-334. IEEE Computer Society, (2018)Accumulation without Homomorphism., , , and . IACR Cryptol. ePrint Arch., (2024)Transparent SNARKs from DARK Compilers., , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 677-706. Springer, (2020)Graph Neural Networks and Boolean Satisfiability., and . CoRR, (2017)Zether: Towards Privacy in a Smart Contract World., , , and . IACR Cryptology ePrint Archive, (2019)