Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for non-interactive instance-dependent commitment schemes (NIC)., , and . Theor. Comput. Sci., (2015)Efficient reliable communication over partially authenticated networks., and . PODC, page 233-242. ACM, (2003)A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC)., , and . ICALP, volume 4596 of Lecture Notes in Computer Science, page 328-339. Springer, (2007)How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge.. TCC, volume 4948 of Lecture Notes in Computer Science, page 89-106. Springer, (2008)A study of perfect zero-knowledge proofs.. University of Victoria, Canada, (2008)Faster Secure Two-Party Computation Using Garbled Circuits., , , and . USENIX Security Symposium, USENIX Association, (2011)Constant-Round Private Function Evaluation with Linear Complexity., and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 556-571. Springer, (2011)VMCrypt: modular software architecture for scalable secure computation.. ACM Conference on Computer and Communications Security, page 715-724. ACM, (2011)Efficient reliable communication over partially authenticated networks., and . Distributed Comput., 18 (1): 1-19 (2005)Semantically Non-preserving Transformations for Antivirus Evaluation., , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 273-281. Springer, (2016)