Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 134-153. Springer, (2012)Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 201-216. Springer, (2007)Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation., and . J. Cryptol., 9 (3): 149-166 (1996)Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks., and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 594-621. Springer, (2023)New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 194-211. Springer, (1989)Randomness in Interactive Proofs, , and . FOCS, page 563-572. IEEE Computer Society, (1990)0-8186-2082-X.Linearity Testing in Characteristic Two., , , , and . FOCS, page 432-441. IEEE Computer Society, (1995)The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures., and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 529-552. Springer, (2020)Non-Interactive Oblivious Transfer and Applications., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 547-557. Springer, (1989)Chain Reductions for Multi-Signatures., and . IACR Cryptol. ePrint Arch., (2021)