Personensuche
X
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
2
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustn..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
3
Limits of Breach-Resistant and Snapshot-Oblivious RAMs:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
4
Lower Bound Framework for Differentially Private and Oblivi..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
6
Lower Bounds for (Batch) PIR with Private Preprocessing:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
8
Forward Secret Encrypted RAM: Lower Bounds and Applications:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
9
Efficient Boolean Search over Encrypted Data with Reduced L..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
10
Lower Bounds for Multi-server Oblivious RAMs:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
11
Lower Bounds for Encrypted Multi-Maps and Searchable Encryp..:
, In:
?
Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms ,
12
Lower bounds for oblivious near-neighbor search:
, In:
?
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems ,
14
What Storage Access Privacy is Achievable with Small Overhe..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15