Personensuche
X
?
Security Standardisation Research; Lecture Notes in Computer Science ,
1
Vision Paper: Do We Need to Change Some Things?: Open Quest..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Communication-Efficient Proactive MPC for Dynamic Groups wi..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
3
In-App Cryptographically-Enforced Selective Access Control ..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
4
Private Join and Compute from PIR with Default:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021 ,
6
On the (in)security of ROS:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
7
Anonymous Tokens with Private Metadata Bit:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
8
Communication-Efficient Proactive Secret Sharing for Dynami..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
9
Secure Single-Server Aggregation with (Poly)Logarithmic Ove..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019 ,
10
Public-Key Function-Private Hidden Vector Encryption (and M..:
, In:
?
Advances in Cryptology – EUROCRYPT 2019; Lecture Notes in Computer Science ,
11
New Techniques for Obfuscating Conjunctions:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
12
WAHC'19 : 7th Workshop on Encrypted Computing & Applied ..:
, In:
?
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies ,
13
Callisto : A Cryptographic Approach to Detecting Serial ..:
, In:
?
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms ,
14
Optimization of bootstrapping in circuits:
, In:
?
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy ,
15