Author of the publication

Secure Computation with Constant Communication Overhead Using Multiplication Embeddings.

, , and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 375-398. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness., , and . TCC (2), volume 11892 of Lecture Notes in Computer Science, page 333-355. Springer, (2019)Secure Non-interactive Simulation from Arbitrary Joint Distributions., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 378-407. Springer, (2022)Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 36-65. Springer, (2018)Optimally-secure Coin-tossing against a Byzantine Adversary., , and . ISIT, page 2858-2863. IEEE, (2021)Exploring the Limits of Common Coins Using Frontier Analysis of Protocols., , , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 486-503. Springer, (2011)On the Power of Public-Key Encryption in Secure Computation., , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 240-264. Springer, (2014)Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields., , , and . EUROCRYPT (4), volume 14654 of Lecture Notes in Computer Science, page 286-315. Springer, (2024)On the Power of Public-key Encryption in Secure Computation., , and . Electron. Colloquium Comput. Complex., (2013)Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family., , , , , , and . TCC (1), volume 13747 of Lecture Notes in Computer Science, page 355-383. Springer, (2022)P4-free Partition and Cover Numbers & Applications., , , , , and . ITC, volume 199 of LIPIcs, page 16:1-16:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)