Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience., , and . ICALP (1), volume 6755 of Lecture Notes in Computer Science, page 391-402. Springer, (2011)Secure Two-Party Computation with Low Communication., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 54-74. Springer, (2012)A Tamper and Leakage Resilient von Neumann Architecture., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 579-603. Springer, (2015)Leakage-Resilient Cryptography from the Inner-Product Extractor., and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 702-721. Springer, (2011)Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier., , , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 140-160. Springer, (2013)Inner Product Masking Revisited., , and . EUROCRYPT (1), volume 9056 of Lecture Notes in Computer Science, page 486-510. Springer, (2015)Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker., , , , and . Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, page 77-94. Springer, (2007)Non-Malleable Codes for Space-Bounded Tampering., , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 95-126. Springer, (2017)A Formal Treatment of Deterministic Wallets., , and . CCS, page 651-668. ACM, (2019)Outsourced pattern matching., , and . Int. J. Inf. Sec., 17 (3): 327-346 (2018)