Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-based Key Exchange with General Policies., , , , and . ACM Conference on Computer and Communications Security, page 1451-1463. ACM, (2016)Stacked Garbling for Disjunctive Zero-Knowledge Proofs., and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 569-598. Springer, (2020)Conditional Encrypted Mapping and Comparing Encrypted Numbers., and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 206-220. Springer, (2006)SSTP: A scalable and secure transport protocol for smart grid data collection., , , and . SmartGridComm, page 161-166. IEEE, (2011)Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.. TCC, volume 5978 of Lecture Notes in Computer Science, page 327-342. Springer, (2010)Improved Garbled Circuit: Free XOR Gates and Applications., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 486-498. Springer, (2008)Password Mistyping in Two-Factor-Authenticated Key Exchange., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 702-714. Springer, (2008)Masked Triples - Amortizing Multiplication Triples Across Conditionals., , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 319-348. Springer, (2021)Auditable, Available and Resilient Private Computation on the Blockchain via MPC., , , , , , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 281-299. Springer, (2022)Scalable Private Set Union from Symmetric-Key Techniques., , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 636-666. Springer, (2019)