Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)., , , , and . IACR Cryptol. ePrint Arch., (2019)Public-Key Cryptography.. Handbook of Information and Communication Security, Springer, (2010)Modeling insider attacks on group key-exchange protocols., and . CCS, page 180-189. ACM, (2005)Incentivizing Blockchain Forks via Whale Transactions., and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 264-279. Springer, (2017)Bridging Game Theory and Cryptography: Recent Results and Future Directions.. TCC, volume 4948 of Lecture Notes in Computer Science, page 251-272. Springer, (2008)Universally Composable Multi-party Computation with an Unreliable Common Reference String., and . TCC, volume 4948 of Lecture Notes in Computer Science, page 142-154. Springer, (2008)On Expected Constant-Round Protocols for Byzantine Agreement., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 445-462. Springer, (2006)Parallel and Concurrent Security of the HB and HB+ Protocols., and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 73-87. Springer, (2006)Partial Fairness in Secure Two-Party Computation., and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 157-176. Springer, (2010)More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 158-188. Springer, (2018)