Author of the publication

Catching MPC Cheaters: Identification and Openability.

, , and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 110-134. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Assessment of Secure Search Systems., , , , , , , , and . Operating Systems Review, 49 (1): 22-30 (2015)Catching MPC Cheaters: Identification and Openability., , and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 110-134. Springer, (2017)Efficient Asynchronous Accumulators for Distributed PKI., and . IACR Cryptology ePrint Archive, (2015)Fuzzy Password-Authenticated Key Exchange., , , , and . EUROCRYPT (3), volume 10822 of Lecture Notes in Computer Science, page 393-424. Springer, (2018)Universally Composable Accumulators., , and . IACR Cryptology ePrint Archive, (2018)Accumulators with Applications to Anonymity-Preserving Revocation., , , , , , and . IACR Cryptology ePrint Archive, (2017)Efficient Asynchronous Accumulators for Distributed PKI., and . SCN, volume 9841 of Lecture Notes in Computer Science, page 292-309. Springer, (2016)A survey of cryptographic approaches to securing big-data analytics in the cloud., , , , and . HPEC, page 1-6. IEEE, (2014)Cryptography for Big Data Security., , , , , and . IACR Cryptology ePrint Archive, (2016)Fuzzy Authenticated Key Exchange., , , , and . IACR Cryptology ePrint Archive, (2017)