Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laconic Private Set Intersection and Applications., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 94-125. Springer, (2021)Fuzzy Private Set Intersection with Large Hyperballs., and . EUROCRYPT (5), volume 14655 of Lecture Notes in Computer Science, page 340-369. Springer, (2024)A Combinatorial Approach to Quantum Random Functions., , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 614-632. Springer, (2020)Multiparty Cardinality Testing for Threshold Private Set Intersection., , and . IACR Cryptol. ePrint Arch., (2020)Towards compact bandwidth and efficient privacy-preserving computation.. Saarland University, Saarbrücken, Germany, (2023)Practical Lattice-Based Distributed Signatures for a Small Number of Signers., , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 376-402. Springer, (2024)Multiparty Cardinality Testing for Threshold Private Intersection., , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 32-60. Springer, (2021)Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages., , , , , , and . CARDIS, volume 10146 of Lecture Notes in Computer Science, page 174-191. Springer, (2016)Boolean Matrix Masking for SM4 Block Cipher Algorithm., , , , , , and . CIS, page 238-242. IEEE Computer Society, (2017)Post Quantum Fuzzy Stealth Signatures and Applications., , , and . CCS, page 371-385. ACM, (2023)