Personensuche
X
?
Cryptography and Coding; Lecture Notes in Computer Science ,
3
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $$\ma..:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
4
MPC with Delayed Parties over Star-Like Networks:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
5
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatu..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
7
Four-Round Black-Box Non-malleable Schemes from One-Way Per..:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
8
Scooby: Improved Multi-party Homomorphic Secret Sharing Bas..:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
9
Efficient Proof of RAM Programs from Any Public-Coin Zero-K..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Feta : Efficient Threshold Designated-Verifier Zero-Know..:
, In:
?
Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science ,
11
Compilation of Function Representations for Secure Computin..:
, In:
?
Arithmetic of Finite Fields; Lecture Notes in Computer Science ,
12
Efficient, Actively Secure MPC with a Dishonest Majority: A..:
, In:
?
Proceedings of the 8th ACM on ASIA Public-Key Cryptography Workshop ,
13
Error Term Checking: Towards Chosen Ciphertext Security wit..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
14