Author of the publication

Scalable Multiparty Computation with Nearly Optimal Work and Resilience.

, , , , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 241-261. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Traceability from Trace Amounts., , , , and . FOCS, page 650-669. IEEE Computer Society, (2015)Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets., , , , and . IEEE Trans. Information Theory, 58 (9): 6207-6222 (2012)Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data., , , and . SIAM J. Comput., 38 (1): 97-139 (2008)Defending Against Attacks on Main Memory Persistence., , , , and . ACSAC, page 65-74. IEEE Computer Society, (2008)Lipschitz Extensions for Node-Private Graph Statistics and the Generalized Exponential Mechanism., and . FOCS, page 495-504. IEEE Computer Society, (2016)Max-Information, Differential Privacy, and Post-Selection Hypothesis Testing., , , and . CoRR, (2016)Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate, and . CoRR, (2010)A Note on Adaptivity in Testing Properties of Bounded Degree Graphs., and . Electronic Colloquium on Computational Complexity (ECCC), (2006)From Soft Classifiers to Hard Decisions: How fair can we be?, , , , , and . CoRR, (2018)Private Graphon Estimation for Sparse Graphs., , and . CoRR, (2015)