Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Anonymous Data Access., , , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 244-273. Springer, (2019)Upgrading Fuzzy Extractors., , , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 156-182. Springer, (2024)Proximity Searchable Encryption for Biometrics., , , and . IACR Cryptol. ePrint Arch., (2020)Upgrading Fuzzy Extractors., , , and . IACR Cryptol. ePrint Arch., (2023)Two-Server Distributed ORAM with Sublinear Computation and Constant Rounds., and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 499-527. Springer, (2021)Proximity Searchable Encryption for the Iris Biometric., , , , and . AsiaCCS, page 1004-1018. ACM, (2022)On the Plausibility of Fully Homomorphic Encryption for RAMs., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 589-619. Springer, (2019)Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy., and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 69-86. Springer, (2015)Two-server Distributed ORAM with Sublinear Computation and Constant Rounds., and . IACR Cryptol. ePrint Arch., (2020)