Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kohlweiss, Markulf
add a person with the name Kohlweiss, Markulf
 

Other publications of authors with the same name

ZQL: A Compiler for Privacy-Preserving Data Processing., , , and . USENIX Security Symposium, page 163-178. USENIX Association, (2013)Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake., , , and . IEEE Symposium on Security and Privacy, page 157-174. IEEE, (2019)Self-certified Sybil-free pseudonyms., , , and . WISEC, page 154-159. ACM, (2008)Modular code-based cryptographic verification., , and . ACM Conference on Computer and Communications Security, page 341-350. ACM, (2011)Dependent types and multi-monadic effects in F., , , , , , , , , and 2 other author(s). POPL, page 256-270. ACM, (2016)Anonymous Transferable E-Cash., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 101-124. Springer, (2015)State Separation for Code-Based Game-Playing Proofs., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 222-249. Springer, (2018)Square Span Programs with Applications to Succinct NIZK Arguments., , , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 532-550. Springer, (2014)Scramble! Your Social Network Data., , and . PETS, volume 6794 of Lecture Notes in Computer Science, page 211-225. Springer, (2011)Private Client-Side Profiling with Random Forests and Hidden Markov Models., , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 18-37. Springer, (2012)