Author of the publication

Two-Message, Oblivious Evaluation of Cryptographic Functionalities.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 619-648. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Selective IBE to Full IBE and Selective HIBE., and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 372-408. Springer, (2017)General Statistically Secure Computation with Bounded-Resettable Hardware Tokens., , , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 319-344. Springer, (2015)Incremental Proofs of Sequential Work., , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 292-323. Springer, (2019)Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 206-220. Springer, (2010)Secure Multiparty Interactive Communication with Unknown Noise Rate., , , , and . CoRR, (2016)Minting Mechanisms for Blockchain - or - Moving from Cryptoassets to Cryptocurrencies., , , , and . IACR Cryptology ePrint Archive, (2018)Laconic Oblivious Transfer and Its Applications., , , , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 33-65. Springer, (2017)Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles., , , and . TCC (2), volume 11892 of Lecture Notes in Computer Science, page 407-437. Springer, (2019)Rate-1 Trapdoor Functions from the Diffie-Hellman Problem., , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 585-606. Springer, (2019)IND-CCA Secure Cryptography Based on a Variant of the LPN Problem., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 485-503. Springer, (2012)