Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials., , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 499-530. Springer, (2016)Witness-Succinct Universally-Composable SNARKs., , , , , and . EUROCRYPT (2), volume 14005 of Lecture Notes in Computer Science, page 315-346. Springer, (2023)Fairness in the Eyes of the Data: Certifying Machine-Learning Models., , , , , and . AIES, page 926-935. ACM, (2021)Balancing Privacy and Accountability in Blockchain Identity Management., , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 552-576. Springer, (2021)Broadcast Extensions with Optimal Communication and Round Complexity., and . PODC, page 371-380. ACM, (2016)Proofs of Replicated Storage Without Timing Assumptions., , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 355-380. Springer, (2019)Fiatâ€"Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)., , , , and . IACR Cryptol. ePrint Arch., (2021)Reverse Firewalls for Adaptively Secure MPC Without Setup., , , and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 335-364. Springer, (2021)ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines., , , , , and . Public Key Cryptography (1), volume 13177 of Lecture Notes in Computer Science, page 584-614. Springer, (2022)Succinct Verification of Compressed Sigma Protocols in the Updatable SRS Setting., , and . Public Key Cryptography (2), volume 14602 of Lecture Notes in Computer Science, page 305-336. Springer, (2024)