Author of the publication

Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions.

, , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 549-580. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Signature Scheme with a Fuzzy Private Key., , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 105-126. Springer, (2015)Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy., and . IEEE Internet Things J., 10 (18): 15990-16005 (September 2023)A Secure and Practical Signature Scheme for Blockchain Based on Biometrics., , , , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 877-891. Springer, (2017)Information-theoretic performance evaluation of likelihood-ratio based biometric score fusion under modality selection attacks., and . BTAS, page 1-8. IEEE, (2015)Local Obfuscation Mechanisms for Hiding Probability Distributions., and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 128-148. Springer, (2019)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). CoRR, (2021)Communication-Efficient Triangle Counting under Local Differential Privacy., , and . USENIX Security Symposium, page 537-554. USENIX Association, (2022)Locality Sensitive Hashing with Extended Differential Privacy., , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 563-583. Springer, (2021)A Succinct Model for Re-identification of Mobility Traces Based on Small Training Data.. ISITA, page 164-168. IEEE, (2018)Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes., , , , and . PST, page 115-126. IEEE Computer Society, (2017)