Author of the publication

Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions.

, , and . SIAM J. Comput., 45 (5): 1793-1834 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy., , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 432-449. Springer, (2011)Towards Non-Black-Box Lower Bounds in Cryptography., , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 579-596. Springer, (2011)On the Security Loss of Unique Signatures., and . TCC (1), volume 11239 of Lecture Notes in Computer Science, page 507-536. Springer, (2018)Black-Box Constructions of Two-Party Protocols from One-Way Functions., and . TCC, volume 5444 of Lecture Notes in Computer Science, page 403-418. Springer, (2009)Universally Composable Security with Global Setup., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 61-85. Springer, (2007)From Unprovability to Environmentally Friendly Protocols., , and . FOCS, page 70-79. IEEE Computer Society, (2013)Knowledge-Preserving Interactive Coding., , and . FOCS, page 449-458. IEEE Computer Society, (2013)Hybrid Consensus: Efficient Consensus in the Permissionless Model., and . DISC, volume 91 of LIPIcs, page 39:1-39:16. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2017)Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition.. EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 160-176. Springer, (2003)Thunderella: Blockchains with Optimistic Instant Confirmation., and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 3-33. Springer, (2018)