From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptively Secure Broadcast Encryption with Small System Parameters.. IACR Cryptology ePrint Archive, (2014)Cutting-Edge Cryptography Through the Lens of Secret Sharing., и . TCC (A2), том 9563 из Lecture Notes in Computer Science, стр. 449-479. Springer, (2016)On Finding Quantum Multi-collisions., и . CoRR, (2018)On the Feasibility of Unclonable Encryption, and More., , , , и . CRYPTO (2), том 13508 из Lecture Notes in Computer Science, стр. 212-241. Springer, (2022)Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles., , и . CRYPTO (1), том 14081 из Lecture Notes in Computer Science, стр. 489-514. Springer, (2023)On ELFs, Deterministic Encryption, and Correlated-Input Security.. EUROCRYPT (3), том 11478 из Lecture Notes in Computer Science, стр. 3-32. Springer, (2019)Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation., и . CRYPTO (1), том 8616 из Lecture Notes in Computer Science, стр. 480-499. Springer, (2014)Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World., и . CRYPTO (2), том 8043 из Lecture Notes in Computer Science, стр. 361-379. Springer, (2013)On Finding Quantum Multi-collisions., и . EUROCRYPT (3), том 11478 из Lecture Notes in Computer Science, стр. 189-218. Springer, (2019)Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation., и . Algorithmica, 79 (4): 1233-1285 (2017)