Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Which Languages Have 4-Round Zero-Knowledge Proofs?. J. Cryptol., 25 (1): 41-56 (2012)ALITHEIA: Towards Practical Verifiable Graph Processing., , and . ACM Conference on Computer and Communications Security, page 856-867. ACM, (2014)Digital Signatures.. Springer, (2010)More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 158-188. Springer, (2018)Bridging Game Theory and Cryptography: Recent Results and Future Directions.. TCC, volume 4948 of Lecture Notes in Computer Science, page 251-272. Springer, (2008)Universally Composable Multi-party Computation with an Unreliable Common Reference String., and . TCC, volume 4948 of Lecture Notes in Computer Science, page 142-154. Springer, (2008)On Expected Constant-Round Protocols for Byzantine Agreement., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 445-462. Springer, (2006)Parallel and Concurrent Security of the HB and HB+ Protocols., and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 73-87. Springer, (2006)Partial Fairness in Secure Two-Party Computation., and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 157-176. Springer, (2010)Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions., , and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 547-572. Springer, (2021)