Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Round Information-Theoretic MPC with Malicious Security., , , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 532-561. Springer, (2019)The Broadcast Message Complexity of Secure Multiparty Computation., , and . ASIACRYPT (1), volume 11921 of Lecture Notes in Computer Science, page 426-455. Springer, (2019)Order-C Secure Multiparty Computation for Highly Repetitive Circuits., , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 663-693. Springer, (2021)Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512., , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 119-135. Springer, (2015)On Actively-Secure Elementary MPC Reductions., and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 717-749. Springer, (2021)Towards Efficiency-Preserving Round Compression in MPC - Do Fewer Rounds Mean More Computation?, , , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 181-212. Springer, (2020)Stacking Sigmas: A Framework to Compose $\varSigma $-Protocols for Disjunctions., , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 458-487. Springer, (2022)Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256., , , , and . INDOCRYPT, volume 9462 of Lecture Notes in Computer Science, page 198-217. Springer, (2015)Scalable Multiparty Garbling., , , , , and . CCS, page 2158-2172. ACM, (2023)Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs., , and . IACR Cryptol. ePrint Arch., (2023)