Author of the publication

Two-Message, Oblivious Evaluation of Cryptographic Functionalities.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 619-648. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts., and . USENIX Security Symposium, page 1317-1333. USENIX Association, (2018)Two-Message, Oblivious Evaluation of Cryptographic Functionalities., , , and . IACR Cryptology ePrint Archive, (2017)Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks., , and . ACM Conference on Computer and Communications Security, page 1426-1437. ACM, (2016)Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys., , , , , and . IET Information Security, 12 (3): 166-183 (2018)Linking Amplification DDoS Attacks to Booter Services., , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 427-449. Springer, (2017)Millions of targets under attack: a macroscopic characterization of the DoS ecosystem., , , , , and . IMC, page 100-113. ACM, (2017)Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys., , , , , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 301-330. Springer, (2016)Two-Message, Oblivious Evaluation of Cryptographic Functionalities., , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 619-648. Springer, (2016)POSTER: Enhancing Security and Privacy with Google Glass., , and . ACM Conference on Computer and Communications Security, page 1445-1447. ACM, (2014)Nearly Optimal Verifiable Data Streaming., , , , , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 417-445. Springer, (2016)