Author of the publication

Robust fingerprinting codes: a near optimal construction.

, , and . Digital Rights Management Workshop, page 3-12. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

True2F: Backdoor-Resistant Authentication Tokens., , , , and . IEEE Symposium on Security and Privacy, page 398-416. IEEE, (2019)Pairing-Based Cryptography: Past, Present, and Future.. ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 1. Springer, (2012)Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves., , , , , , , and . IACR Cryptology ePrint Archive, (2018)Building a Community of Real-World Cryptographers., , and . IEEE Secur. Priv., 14 (6): 7-9 (2016)Adversarial Training and Robustness for Multiple Perturbations, and . (2019)Signing a Linear Subspace: Signature Schemes for Network Coding., , , and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 68-87. Springer, (2009)Short Signatures Without Random Oracles., and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 56-73. Springer, (2004)On the effectiveness of address-space randomization., , , , , and . CCS, page 298-307. ACM, (2004)Differentially Private Learning Needs Better Features (or Much More Data)., and . CoRR, (2020)07381 Abstracts Collection -- Cryptography., , , and . Cryptography, volume 07381 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)