Search for persons
X
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
1
Forward Security Under Leakage Resilience, Revisited:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
2
Deniable Authentication When Signing Keys Leak:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
3
Reverse Firewalls for Oblivious Transfer Extension and Appl..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
4
A Map of Witness Maps: New Definitions and Connections:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
5
Efficiently Testable Circuits Without Conductivity:
, In:
?
Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science ,
6
Universally Composable Subversion-Resilient Cryptography:
, In:
?
Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science ,
7
COA-Secure Obfuscation and Applications:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
8
Trojan-Resilience Without Cryptography:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
9
Reverse Firewalls for Adaptively Secure MPC Without Setup:
, In:
?
Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science ,
10
Inverse-Sybil Attacks in Automated Contact Tracing:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2020 ,
11
Witness Maps and Applications:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
12
Reverse Firewalls for Actively Secure MPCs:
, In:
?
Topics in Cryptology – CT-RSA 2019; Lecture Notes in Computer Science ,
14
Public Key Encryption Resilient to Post-challenge Leakage a..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
15