Author of the publication

Non-Malleable Codes for Space-Bounded Tampering.

, , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 95-126. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Malleable Codes for Space-Bounded Tampering., , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 95-126. Springer, (2017)Bitcoin-Compatible Virtual Channels., , , , , , , and . SP, page 901-918. IEEE, (2021)On Structure-Preserving Cryptography and Lattices., , , and . Public Key Cryptography (3), volume 14603 of Lecture Notes in Computer Science, page 255-287. Springer, (2024)FastKitten: Practical Smart Contracts on Bitcoin., , , , , , , and . USENIX Security Symposium, page 801-818. USENIX Association, (2019)Multi-party Virtual State Channels., , , , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 625-656. Springer, (2019)Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 467-495. Springer, (2019)Compact Selective Opening Security from LWE., , , , and . Public Key Cryptography (4), volume 14604 of Lecture Notes in Computer Science, page 127-160. Springer, (2024)General State Channel Networks., , and . ACM Conference on Computer and Communications Security, page 949-966. ACM, (2018)Foundations of Generalized State Channel Networks.. Technical University of Darmstadt, Germany, (2021)Two-Party Adaptor Signatures from Identification Schemes., , , , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 451-480. Springer, (2021)