Search for persons
X
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
1
Threshold Structure-Preserving Signatures:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
2
From Polynomial IOP and Commitments to Non-malleable zkSNAR..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
How to Compile Polynomial IOP into Simulation-Extractable S..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
4
Privacy-Preserving Blueprints:
, In:
?
Lecture Notes in Networks and Systems; Blockchain and Applications, 4th International Congress ,
5
Bottom-Up Trust Registry in Self Sovereign Identity:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
6
PEReDi : Privacy-Enhanced, Regulated and Distributed Cen..:
, In:
?
Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science ,
8
Key-Schedule Security for the TLS 1.3 Standard:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
9
What Makes Fiat–Shamir zkSNARKs (Updatable SRS) Simulation ..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
10
Snarky Ceremonies:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
11
Consistency for Functional Encryption:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
12
Composition with Knowledge Assumptions:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
13
On the Anonymity Guarantees of Anonymous Proof-of-Stake Pro..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
14
Another Look at Extraction and Randomization of Groth's zk-..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
15