Personensuche
X
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
1
Efficient KZG-Based Univariate Sum-Check and Lookup Argumen:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
2
A Refined Hardness Estimation of LWE in Two-Step Mode:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
3
FaBFT: Flexible Asynchronous BFT Protocol Using DAG:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
5
On the (In)Security of Manufacturer-Provided Remote Attesta..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
6
More Efficient Public-Key Cryptography with Leakage and Tam..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
9
Correction to: Practical Multi-party Private Set Intersecti..:
, In:
?
2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) ,
10
RGDroid: Detecting Android Malware with Graph Convolutional..:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
11
Polynomial IOPs for Memory Consistency Checks in Zero-Knowl..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
12
Practical Multi-party Private Set Intersection Cardinality ..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
14
HODOR: Shrinking Attack Surface on Node.js via System Call ..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
15