Author of the publication

Adaptive Security of Practical Garbling Schemes.

, and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 741-762. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Oblivious Priority Queues and Offline Oblivious RAM., , and . IACR Cryptology ePrint Archive, (2019)Adaptive Security of Yao's Garbled Circuits., and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 433-458. (2016)Tamper Detection and Continuous Non-malleable Codes., and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 451-480. Springer, (2015)3SUM, 3XOR, Triangles, and . CoRR, (2013)Adaptively Indistinguishable Garbled Circuits., , and . TCC (2), volume 10678 of Lecture Notes in Computer Science, page 40-71. Springer, (2017)Optimal Oblivious Priority Queues., , and . SODA, page 2366-2383. SIAM, (2021)Adaptive Security of Practical Garbling Schemes., and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 741-762. Springer, (2020)