Author of the publication

MAC Precomputation with Applications to Secure Memory.

, , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 427-442. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conditional Encrypted Mapping and Comparing Encrypted Numbers., and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 206-220. Springer, (2006)Improved Garbled Circuit: Free XOR Gates and Applications., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 486-498. Springer, (2008)Password Mistyping in Two-Factor-Authenticated Key Exchange., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 702-714. Springer, (2008)Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.. TCC, volume 5978 of Lecture Notes in Computer Science, page 327-342. Springer, (2010)SSTP: A scalable and secure transport protocol for smart grid data collection., , , and . SmartGridComm, page 161-166. IEEE, (2011)Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams., , , , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 431-432. Springer, (2012)Stacked Garbling for Disjunctive Zero-Knowledge Proofs., and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 569-598. Springer, (2020)Attribute-based Key Exchange with General Policies., , , , and . ACM Conference on Computer and Communications Security, page 1451-1463. ACM, (2016)Masked Triples - Amortizing Multiplication Triples Across Conditionals., , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 319-348. Springer, (2021)Auditable, Available and Resilient Private Computation on the Blockchain via MPC., , , , , , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 281-299. Springer, (2022)