Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Techniques for Obfuscating Conjunctions., , , and . IACR Cryptology ePrint Archive, (2018)Preventing Zeroizing Attacks on GGH15., , , and . IACR Cryptology ePrint Archive, (2018)New Techniques for Obfuscating Conjunctions., , , and . EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 636-666. Springer, (2019)Indistinguishability Obfuscation of Null Quantum Circuits and Applications., and . ITCS, volume 215 of LIPIcs, page 15:1-15:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Return of GGH15: Provable Security Against Zeroizing Attacks., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 544-574. Springer, (2018)Public-Key Function-Private Hidden Vector Encryption (and More)., , , , , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 489-519. Springer, (2019)Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption., , , , , and . ITCS, volume 151 of LIPIcs, page 82:1-82:39. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)The Distinction Between Fixed and Random Generators in Group-Based Assumptions., , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 801-830. Springer, (2019)On the (In)security of Kilian-Based SNARGs., , , , and . TCC (2), volume 11892 of Lecture Notes in Computer Science, page 522-551. Springer, (2019)