Search for persons
X
?
Proceedings of the ACM on Web Conference 2024 ,
1
Differentially Private Selection from Secure Distributed Co..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
2
Improved Distributed RSA Key Generation Using the Miller-Ra..:
, In:
?
Progress in Cryptology – LATINCRYPT 2023; Lecture Notes in Computer Science ,
3
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-P..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
4
Secure Multiparty Computation from Threshold Encryption Bas..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
5
Minimizing Setup in Broadcast-Optimal Two Round MPC:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
6
Broadcast-Optimal Four-Round MPC in the Plain Model:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
7
On Access Control Encryption Without Sanitization:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
8
An Algebraic Framework for Silent Preprocessing with Trustl..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
9
Vector Commitments over Rings and Compressed $$\varSigma $$..:
, In:
?
Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science ,
11
Balancing Privacy and Accountability in Blockchain Identity..:
, In:
?
Public-Key Cryptography – PKC 2021; Lecture Notes in Computer Science ,
12
Two-Round n-out-of-n and Multi-signatures and Trapdoor Comm..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
13
Improved Single-Round Secure Multiplication Using Regenerat..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
14
Information-Theoretically Secure MPC Against Mixed Dynamic ..:
, In:
?
Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science ,
15