Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Fewest Clues Problem., , , , and . FUN, volume 49 of LIPIcs, page 12:1-12:12. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2016)Arboral satisfaction: Recognition and LP approximation., , , , , , , , , and . Inf. Process. Lett., (2017)You Should Be Scared of German Ghost., , , and . JIP, 23 (3): 293-298 (2015)The fewest clues problem., , , , and . Theor. Comput. Sci., (2018)New Techniques for Obfuscating Conjunctions., , , and . IACR Cryptology ePrint Archive, (2018)Preventing Zeroizing Attacks on GGH15., , , and . IACR Cryptology ePrint Archive, (2018)Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption., and . IACR Cryptology ePrint Archive, (2017)Return of GGH15: Provable Security Against Zeroizing Attacks., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 544-574. Springer, (2018)Public-Key Function-Private Hidden Vector Encryption (and More)., , , , , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 489-519. Springer, (2019)Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption., , , , , and . ITCS, volume 151 of LIPIcs, page 82:1-82:39. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)