Author of the publication

Maliciously Secure Multi-Client ORAM.

, , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 645-664. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Malleable Zero-Knowledge Proofs., , , , and . CSF, page 412-426. IEEE Computer Society, (2015)WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring., , , , , and . USENIX Security Symposium, page 1493-1510. USENIX Association, (2018)Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability., , , , and . NDSS, The Internet Society, (2019)Computationally Sound Abstraction and Verification of Secure Multi-Party Computations., , and . FSTTCS, volume 8 of LIPIcs, page 352-363. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2010)Differentially private data aggregation with optimal utility., , , , and . ACSAC, page 316-325. ACM, (2014)Authenticity by tagging and typing., , and . FMSE, page 1-12. ACM, (2004)Securing social networks., , and . PODC, page 341-342. ACM, (2011)Brief announcement: anonymity and trust in distributed systems., , , and . PODC, page 237-238. ACM, (2010)Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol., , and . IEEE Symposium on Security and Privacy, page 202-215. IEEE Computer Society, (2008)Concurrency and Privacy with Payment-Channel Networks., , , , and . CoRR, (2019)