Search for persons
X
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
4
Memory and Round-Efficient MPC Primitives in the Pre-Proces..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
5
Efficient Two-Party Exponentiation from Quotient Transfer:
, In:
?
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy ,
8
Efficient Dynamic Searchable Encryption with Forward Privac..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
9
Secure Parallel Computation on Privately Partitioned Data a..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
10
Oblivious Linear Group Actions and Applications:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
11
Revisiting Fuzzy Signatures: Towards a More Risk-Free Crypt..:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
12
Non-interactive Secure Multiparty Computation for Symmetric..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
13
Secure Graph Analysis at Scale:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
14