Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Revisiting Transaction Ledger Robustness in the Miner Extra..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
2
McFly: Verifiable Encryption to the Future Made Practical:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
3
GearBox : Optimal-size Shard Committees by Leveraging th..:
, In:
?
Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science ,
5
Universally Composable Subversion-Resilient Cryptography:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
6
Random-Index PIR and Applications:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
7
YOSO: You Only Speak Once: Secure MPC with Stateless Epheme..:
, In:
?
Progress in Cryptology – LATINCRYPT 2021; Lecture Notes in Computer Science ,
8
Weight-Based Nakamoto-Style Blockchains:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
9
Broadcast-Optimal Two Round MPC with an Honest Majority:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
11
Reparo: Publicly Verifiable Layer to Repair Blockchains:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
12
Refresh When You Wake Up: Proactive Threshold Wallets with ..:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
15