From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tight Verifiable Delay Functions., , , и . IACR Cryptol. ePrint Arch., (2019)Laconic Private Set Intersection and Applications., , , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 94-125. Springer, (2021)Amortizing Rate-1 OT and Applications to PIR and PSI., , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 126-156. Springer, (2021)Is Private Learning Possible with Instance Encoding?, , , , , , , и . SP, стр. 410-427. IEEE, (2021)Cryptography with Weights: MPC, Encryption and Signatures., , , , , и . CRYPTO (1), том 14081 из Lecture Notes in Computer Science, стр. 295-327. Springer, (2023)Incremental Program Obfuscation., и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 193-223. Springer, (2017)TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption., , и . CRYPTO (3), том 9816 из Lecture Notes in Computer Science, стр. 563-592. Springer, (2016)zkSaaS: Zero-Knowledge SNARKs as a Service., , , , и . USENIX Security Symposium, стр. 4427-4444. USENIX Association, (2023)Trapdoor Hash Functions and Their Applications., , , , , и . CRYPTO (3), том 11694 из Lecture Notes in Computer Science, стр. 3-32. Springer, (2019)How to Prove Statements Obliviously?, , и . CRYPTO (10), том 14929 из Lecture Notes in Computer Science, стр. 449-487. Springer, (2024)