Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure distributed storage and retrieval., , , and . Theor. Comput. Sci., 243 (1-2): 363-389 (2000)A Simplified Approach to Threshold and Proactive RSA.. CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 89-104. Springer, (1998)Attribute-based Key Exchange with General Policies., , , , and . ACM Conference on Computer and Communications Security, page 1451-1463. ACM, (2016)Secure Multiparty Computation with General Interaction Patterns., , , , and . ITCS, page 157-168. ACM, (2016)On Fully Secure MPC with Solitary Output., , , , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 312-340. Springer, (2019)Secure Distributed Storage and Retrieval., , , and . WDAG, volume 1320 of Lecture Notes in Computer Science, page 275-289. Springer, (1997)Secure Hashed Diffie-Hellman over Non-DDH Groups., , and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 361-381. Springer, (2004)Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card., , , , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 181-200. Springer, (2003)Towards a Privacy Research Roadmap for the Computing Community., , , , and . CoRR, (2016)On the Local Leakage Resilience of Linear Secret Sharing Schemes., , , and . IACR Cryptology ePrint Archive, (2019)