Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bivariate Polynomials Modulo Composites and Their Applications., and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 42-62. Springer, (2014)The Function-Inversion Problem: Barriers and Opportunities., and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 393-421. Springer, (2019)Private Web Search with Tiptoe., , , and . SOSP, page 396-416. ACM, (2023)Single-Server Private Information Retrieval with Sublinear Amortized Time., , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 3-33. Springer, (2022)Accountable authentication with privacy protection: The Larch system for universal login., , , and . OSDI, page 81-98. USENIX Association, (2023)Private Information Retrieval with Sublinear Online Time., and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 44-75. Springer, (2020)FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions., and . ACM DEV, page 1-10. ACM, (2014)The Discrete-Logarithm Problem with Preprocessing., and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 415-447. Springer, (2018)One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval., , , , and . USENIX Security Symposium, page 3889-3905. USENIX Association, (2023)True2F: Backdoor-Resistant Authentication Tokens., , , , and . IEEE Symposium on Security and Privacy, page 398-416. IEEE, (2019)