Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securely Obfuscating Re-Encryption., , , and . J. Cryptology, 24 (4): 694-719 (2011)A Tight Bound for Set Disjointness in the Message-Passing Model., , , , and . FOCS, page 668-677. IEEE Computer Society, (2013)SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers., , and . IEEE Trans. Computers, 65 (9): 2848-2858 (2016)Tight Bounds for Set Disjointness in the Message Passing Model, , , , and . CoRR, (2013)Reusable Non-Interactive Secure Computation., , , , , , and . IACR Cryptology ePrint Archive, (2018)Adversarially Robust Property Preserving Hash Functions., , and . IACR Cryptology ePrint Archive, (2018)Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage., , , and . IACR Cryptology ePrint Archive, (2010)Aggregatable Pseudorandom Functions and Connections to Learning., , and . IACR Cryptology ePrint Archive, (2015)Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings., and . IACR Cryptology ePrint Archive, (2016)Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions., , , and . IACR Cryptology ePrint Archive, (2017)