From post

Non-Malleable Codes for Partial Functions with Manipulation Detection.

, , и . CRYPTO (3), том 10993 из Lecture Notes in Computer Science, стр. 577-607. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - A Provably Secure Blockchain Protocol., , , и . CRYPTO (2), том 13508 из Lecture Notes in Computer Science, стр. 339-369. Springer, (2022)Conclave: A Collective Stake Pool Protocol., , и . ESORICS (1), том 12972 из Lecture Notes in Computer Science, стр. 370-389. Springer, (2021)Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content., и . CCS, стр. 231-242. ACM, (2015)Efficient Steganography with Provable Security Guarantees., , и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 118-130. Springer, (2005)Consensus from Signatures of Work., , и . CT-RSA, том 12006 из Lecture Notes in Computer Science, стр. 319-344. Springer, (2020)The combinatorics of hidden diversity., , , и . Theor. Comput. Sci., (2020)Self-tallying Elections and Perfect Ballot Secrecy., и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 141-158. Springer, (2002)Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup., , , и . Public Key Cryptography (2), том 10770 из Lecture Notes in Computer Science, стр. 465-495. Springer, (2018)Hidden identity-based signatures., и . IET Inf. Secur., 3 (3): 119-127 (2009)KACHINA - Foundations of Private Smart Contracts., , и . CSF, стр. 1-16. IEEE, (2021)