Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Round MPC from LWE via Multi-Key FHE., and . IACR Cryptology ePrint Archive, (2015)Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 626-642. Springer, (2022)Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits., , , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 111-128. Springer, (2014)A More Complete Analysis of the Signal Double Ratchet Algorithm., , , , and . CRYPTO (1), volume 13507 of Lecture Notes in Computer Science, page 784-813. Springer, (2022)PASTA: PASsword-based Threshold Authentication., , , and . CCS, page 2042-2059. ACM, (2018)Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 467-495. Springer, (2019)BETA: Biometric Enabled Threshold Authentication., , , , and . IACR Cryptol. ePrint Arch., (2020)Continuous Non-malleable Codes., , , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 465-488. Springer, (2014)The Chaining Lemma and Its Application., , , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 181-196. Springer, (2015)Two Round Multiparty Computation via Multi-key FHE., and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 735-763. Springer, (2016)