Author of the publication

Secure Computation of the Mean and Related Statistics.

, , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 283-302. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?, , and . J. Cryptology, 28 (1): 29-48 (2015)Direct chosen-ciphertext secure identity-based key encapsulation without random oracles., and . Theor. Comput. Sci., 410 (47-49): 5093-5111 (2009)Append-Only Signatures., , , and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 434-445. Springer, (2005)Efficient Authentication from Hard Learning Problems., , , , and . J. Cryptology, 30 (4): 1238-1275 (2017)Tightly-Secure Signatures from Five-Move Identification Protocols., , and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 68-94. Springer, (2017)Practical Chosen Ciphertext Secure Encryption from Factoring., and . EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, page 313-332. Springer, (2009)A New Randomness Extraction Paradigm for Hybrid Encryption., , , and . EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, page 590-609. Springer, (2009)Optimal Security Proofs for Full Domain Hash, Revisited., and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 537-553. Springer, (2012)Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks., , , and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 381-402. Springer, (2010)Adaptive Trapdoor Functions and Chosen-Ciphertext Security., , and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 673-692. Springer, (2010)