Author of the publication

Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks.

, , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 303-318. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steepest Gradient-Based Orthogonal Precoder For Integer-Forcing MIMO., , , and . CoRR, (2019)Implementation of a two-way relay network with compute-and-forward in GNU Radio., , and . Trans. Emerg. Telecommun. Technol., 27 (4): 484-493 (2016)On massive MIMO physical layer cryptosystem., and . ITW Fall, page 292-296. IEEE, (2015)Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand., , , , , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 560-578. Springer, (2021)A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 66-85. Springer, (2022)Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy., , , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 24-43. Springer, (2021)Result Pattern Hiding Searchable Encryption for Conjunctive Queries., , , , , , , , and . CCS, page 745-762. ACM, (2018)MPSign: A Signature from Small-Secret Middle-Product Learning with Errors., , , , , , , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 66-93. Springer, (2020)CRYSTALS-Kyber With Lattice Quantizer., and . ISIT, page 2886-2891. IEEE, (2024)Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems., , , , and . CoRR, (2024)