Personensuche
X
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
3
Laconic Branching Programs from the Diffie-Hellman Assumpti..:
, In:
?
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) ,
4
Language Adaptive Weight Generation for Multi-Task Visual G..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
5
Unidirectional Updatable Encryption and Proxy Re-encryption..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
6
On the Round Complexity of Fully Secure Solitary MPC with H..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
8
Amortizing Rate-1 OT and Applications to PIR and PSI:
, In:
?
Public-Key Cryptography – PKC 2021; Lecture Notes in Computer Science ,
9
Multi-party Threshold Private Set Intersection with Subline..:
, In:
?
Topics in Cryptology – CT-RSA 2020; Lecture Notes in Computer Science ,
10
Cut-and-Choose for Garbled RAM:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
11
Private Set Intersection in the Internet Setting from Light..:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
12
Two-Sided Malicious Security for Private Intersection-Sum w..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – CRYPTO 2018 ,
13
Two-Round Multiparty Secure Computation Minimizing Public K..:
, In:
?
Progress in Cryptology – INDOCRYPT 2018; Lecture Notes in Computer Science ,
14
Obfuscation from Low Noise Multilinear Maps:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
15