Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perfect MPC over Layered Graphs., , , , , , , and . CRYPTO (1), volume 14081 of Lecture Notes in Computer Science, page 360-392. Springer, (2023)Computationally Private Randomizing Polynomials and Their Applications., , and . CCC, page 260-274. IEEE Computer Society, (2005)Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC., , , , and . CCS, page 1591-1605. ACM, (2020)Bounded Indistinguishability and the Complexity of Recovering Secrets., , , and . Electron. Colloquium Comput. Complex., (2015)Oblivious Transfer with Constant Computational Overhead., , , , , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 271-302. Springer, (2023)Function Secret Sharing., , and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 337-367. Springer, (2015)Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation., , , , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 871-900. Springer, (2021)Secure Multiparty Computation with Sublinear Preprocessing., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 427-457. Springer, (2022)Special Section on the Forty-Fifth Annual ACM Symposium on the Theory of Computing (STOC 2013)., , and . SIAM J. Comput., 45 (2): 459-460 (2016)On the Power of Nonlinear Secret-Sharing., and . IACR Cryptology ePrint Archive, (2001)