From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Breaking the Sub-Exponential Barrier in Obfustopia., , , и . EUROCRYPT (3), том 10212 из Lecture Notes in Computer Science, стр. 156-181. (2017)ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation., , , , и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 556-576. Springer, (2019)Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs., и . CRYPTO (4), том 12828 из Lecture Notes in Computer Science, стр. 34-64. Springer, (2021)Compact Ring Signatures from Learning with Errors., , , , , , , и . CRYPTO (1), том 12825 из Lecture Notes in Computer Science, стр. 282-312. Springer, (2021)On the Exact Round Complexity of Self-composable Two-Party Computation., , и . EUROCRYPT (2), том 10211 из Lecture Notes in Computer Science, стр. 194-224. (2017)Deterministic Public-Key Encryption Under Continual Leakage., , , и . ACNS, том 9696 из Lecture Notes in Computer Science, стр. 304-323. Springer, (2016)Argus: Multi-Level Service Visibility Scoping for Internet-of-Things in Enterprise Environments., , и . IPDPS, стр. 654-663. IEEE, (2020)Secure Multiparty RAM Computation in Constant Rounds., , , и . TCC (B1), том 9985 из Lecture Notes in Computer Science, стр. 491-520. (2016)Incremental Program Obfuscation., и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 193-223. Springer, (2017)Relaxed Two-to-One Recoding Schemes., , и . SCN, том 8642 из Lecture Notes in Computer Science, стр. 57-76. Springer, (2014)