Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Witness Encryption and Null-IO from Evasive LWE., , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 195-221. Springer, (2022)Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance., , and . TCC (3), volume 14371 of Lecture Notes in Computer Science, page 93-122. Springer, (2023)Updatable Public Key Encryption in the Standard Model., , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 254-285. Springer, (2021)Succinct LWE Sampling, Random Polynomials, and Obfuscation., , , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 256-287. Springer, (2021)Candidate Obfuscation via Oblivious LWE Sampling., and . EUROCRYPT (3), volume 12698 of Lecture Notes in Computer Science, page 127-156. Springer, (2021)The Edited Truth., , and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 305-340. Springer, (2017)Tamper Detection and Continuous Non-malleable Codes., and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 451-480. Springer, (2015)Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key., , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 388-419. Springer, (2016)Fully Leakage-Resilient Signatures., , and . EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, page 89-108. Springer, (2011)Adaptively Secure MPC with Sublinear Communication Complexity., , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 30-60. Springer, (2019)