From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Two-Party Computation with Low Communication., , и . IACR Cryptology ePrint Archive, (2011)Individual Cryptography., , и . CRYPTO (2), том 14082 из Lecture Notes in Computer Science, стр. 547-579. Springer, (2023)On the Related-Key Attack Security of Authenticated Encryption Schemes., , , и . SCN, том 13409 из Lecture Notes in Computer Science, стр. 362-386. Springer, (2022)Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier., , , и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 140-160. Springer, (2013)Non-Malleable Codes for Space-Bounded Tampering., , , и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 95-126. Springer, (2017)Secure Two-Party Computation with Low Communication., , и . TCC, том 7194 из Lecture Notes in Computer Science, стр. 54-74. Springer, (2012)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , и . J. Cryptol., 32 (1): 151-177 (2019)A Formal Treatment of Deterministic Wallets., , и . ACM Conference on Computer and Communications Security, стр. 651-668. ACM, (2019)A Tamper and Leakage Resilient von Neumann Architecture., , , и . Public Key Cryptography, том 9020 из Lecture Notes in Computer Science, стр. 579-603. Springer, (2015)Leakage-Resilient Cryptography From the Inner-Product Extractor., и . IACR Cryptol. ePrint Arch., (2011)