Personensuche
X
?
Security Standardisation Research; Lecture Notes in Computer Science ,
1
Vision Paper: Do We Need to Change Some Things?: Open Quest..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Communication-Efficient Proactive MPC for Dynamic Groups wi..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
4
In-App Cryptographically-Enforced Selective Access Control ..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
5
Private Join and Compute from PIR with Default:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021 ,
7
On the (in)security of ROS:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
8
Anonymous Tokens with Private Metadata Bit:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
9
Communication-Efficient Proactive Secret Sharing for Dynami..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
10
Secure Single-Server Aggregation with (Poly)Logarithmic Ove..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019 ,
13
Public-Key Function-Private Hidden Vector Encryption (and M..:
, In:
?
Advances in Cryptology – EUROCRYPT 2019; Lecture Notes in Computer Science ,
14
New Techniques for Obfuscating Conjunctions:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15