From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Formal Treatment of Deterministic Wallets., , и . ACM Conference on Computer and Communications Security, стр. 651-668. ACM, (2019)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , и . J. Cryptol., 32 (1): 151-177 (2019)Secure Two-Party Computation with Low Communication., , и . IACR Cryptology ePrint Archive, (2011)Secure Two-Party Computation with Low Communication., , и . TCC, том 7194 из Lecture Notes in Computer Science, стр. 54-74. Springer, (2012)Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier., , , и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 140-160. Springer, (2013)Non-Malleable Codes for Space-Bounded Tampering., , , и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 95-126. Springer, (2017)Long Paper: Provable Secure Parallel Gadgets., , и . IACR Cryptol. ePrint Arch., (2023)Leakage-Resilient Cryptography From the Inner-Product Extractor., и . IACR Cryptol. ePrint Arch., (2011)Financially Backed Covert Security., , , и . Public Key Cryptography (2), том 13178 из Lecture Notes in Computer Science, стр. 99-129. Springer, (2022)Inner Product Masking Revisited., , и . EUROCRYPT (1), том 9056 из Lecture Notes in Computer Science, стр. 486-510. Springer, (2015)