Author of the publication

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.

, , , , , , and . IACR Cryptology ePrint Archive, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Daten verschlüsselt speichern und verarbeiten in der Cloud., , and . Datenschutz und Datensicherheit, 39 (8): 531-535 (2015)Basic Algorithms for Rational Function Fields., and . J. Symb. Comput., 27 (2): 143-170 (1999)Über Quantencomputer und Quantenkryptographie., , , and . Datenschutz und Datensicherheit, (2002)Separation of Orbits under Group Actions with an Application to Quantum Systems., and . Appl. Algebra Eng. Commun. Comput., 10 (4/5): 279-303 (2000)Guest editorial., and . Inform., Forsch. Entwickl., 21 (1-2): 1-2 (2006)Cryptanalysis of a practical quantum key distribution with polarization-entangled photons., , and . Quantum Information & Computation, 5 (3): 181-186 (2005)Polynomial Runtime in Simulatability Definitions., , and . CSFW, page 156-169. IEEE Computer Society, (2005)Reusing Tamper-Proof Hardware in UC-Secure Protocols., , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 463-493. Springer, (2018)A CCA2 Secure Variant of the McEliece Cryptosystem, , , and . CoRR, (2012)Non-Malleability vs. CCA-Security: The Case of Commitments., , , and . IACR Cryptology ePrint Archive, (2017)