Personensuche
X
?
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security ,
1
Dataset, Noise Analysis, and Automated Parameter Estimation..:
, In:
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
2
On Sustainable Ring-Based Anonymous Systems:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Chainable Functional Commitments for Unbounded-Depth Circui..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
4
Lattice-Based Timed Cryptography:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
5
Lattice-Based Succinct Arguments from Vanishing Polynomials..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
6
Efficient Laconic Cryptography from Learning with Errors:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
10
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, a..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
11
Quantum Rewinding for Many-Round Protocols:
, In:
?
2022 IEEE International Symposium on Information Theory (ISIT) ,
12
Multichannel Optimal Tree-Decodable Codes are Not Always Op..:
, In:
?
TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON) ,
13
On the Applications and Parallelization of Multichannel Sou..:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
14