Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited.. TCC (1), volume 10677 of Lecture Notes in Computer Science, page 206-233. Springer, (2017)One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments.. TCC, volume 4392 of Lecture Notes in Computer Science, page 419-433. Springer, (2007)On the Security of the TLS Protocol: A Systematic Analysis., , and . CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, page 429-448. Springer, (2013)On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations., , , and . LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 189-204. Springer, (2010)Partial Garbling Schemes and Their Applications., and . ICALP (1), volume 8572 of Lecture Notes in Computer Science, page 650-662. Springer, (2014)Pointproofs: Aggregating Proofs for Multiple Vector Commitments., , , and . ACM Conference on Computer and Communications Security, page 2007-2023. ACM, (2020)FABEO: Fast Attribute-Based Encryption with Optimal Security., and . CCS, page 2491-2504. ACM, (2022)Pixel: Multi-signatures for Consensus., , , and . USENIX Security Symposium, page 2093-2110. USENIX Association, (2020)Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula., and . SCN, volume 8642 of Lecture Notes in Computer Science, page 277-297. Springer, (2014)A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes., and . APPROX-RANDOM, volume 3122 of Lecture Notes in Computer Science, page 298-309. Springer, (2004)