Search for persons
X
?
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security ,
2
Dataset, Noise Analysis, and Automated Parameter Estimation..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Chainable Functional Commitments for Unbounded-Depth Circui..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
5
Lattice-Based Succinct Arguments from Vanishing Polynomials..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
6
Lattice-Based Timed Cryptography:
, In:
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
7
On Sustainable Ring-Based Anonymous Systems:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
8
Efficient Laconic Cryptography from Learning with Errors:
, In:
?
TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON) ,
10
On the Applications and Parallelization of Multichannel Sou..:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
12
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, a..:
, In:
?
2022 IEEE International Symposium on Information Theory (ISIT) ,
13
Multichannel Optimal Tree-Decodable Codes are Not Always Op..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
14
Quantum Rewinding for Many-Round Protocols:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
15