Author of the publication

Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited.

, , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 721-742. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims., and . AsiaCCS, page 855-869. ACM, (2023)Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -., , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 335-354. Springer, (2020)Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles.. CoRR, (2024)Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform., , , and . CoRR, (2022)Recurring Contingent Service Payment., , and . EuroS&P, page 724-756. IEEE, (2023)Smart Donations: Event-Driven Conditional Donations Using Smart Contracts On The Blockchain., , , , , , , , and . OZCHI, page 546-557. ACM, (2020)Safeguarding Physical Sneaker Sale Through a Decentralized Medium., , , and . IACR Cryptol. ePrint Arch., (2023)Multi-party Updatable Delegated Private Set Intersection., , , and . Financial Cryptography, volume 13411 of Lecture Notes in Computer Science, page 100-119. Springer, (2022)Recurring Contingent Service Payment., , and . CoRR, (2022)Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models., , and . CoRR, (2024)