Search for persons
X
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024 ,
1
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions:
, In:
?
Progress in Cryptology - AFRICACRYPT 2023; Lecture Notes in Computer Science ,
2
Impossibilities in Succinct Arguments: Black-Box Extraction..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Algebraic Group Model with Oblivious Sampling:
, In:
?
Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science ,
4
Counting Vampires: From Univariate Sumcheck to Updatable ZK..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
5
Verifiably-Extractable OWFs and Their Applications to Subve..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
6
Snarky Ceremonies:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
8
Another Look at Extraction and Randomization of Groth's zk-..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
9
Somewhere Statistically Binding Commitment Schemes with App..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2020 ,
10
On QA-NIZK in the BPK Model:
, In:
?
Topics in Cryptology – CT-RSA 2020; Lecture Notes in Computer Science ,
11
A Non-interactive Shuffle Argument with Low Trust Assumptio..:
, In:
?
Progress in Cryptology – AFRICACRYPT 2019; Lecture Notes in Computer Science ,
12
UC-Secure CRS Generation for SNARKs:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
13
DL-Extractable UC-Commitment Schemes:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
14