Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2022 article
Black-Box Anonymous Commit-and-Prove
SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), Vol. 13409, pp. 591–614.
2022 article
Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust
CYBER SECURITY, CRYPTOLOGY, AND MACHINE LEARNING, Vol. 13301, pp. 318–336.
2021 article
One-Time Traceable Ring Signatures
COMPUTER SECURITY - ESORICS 2021, PT II, Vol. 12973, pp. 481–500.
2020 article
Anonymous Lottery In The Proof-of-Stake Setting
2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), pp. 318–333.
2018 article
Population Stability: Regulating Size in the Presence of an Adversary
PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 397–406.
2017 chapter
Adaptively Indistinguishable Garbled Circuits
In Theory of Cryptography (pp. 40–71).
2017 chapter
Server-Aided Secure Computation with Off-line Parties
In Computer Security – ESORICS 2017 (pp. 103–123).
2017 article
Sublinear Zero-Knowledge Arguments for RAM Programs
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, Vol. 10210, pp. 501–531.
2016 chapter
Adaptively Secure Garbled Circuits from One-Way Functions
In Advances in Cryptology – CRYPTO 2016 (pp. 149–178).
2016 chapter
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
In Advances in Cryptology – ASIACRYPT 2016 (pp. 777–804).
2016 chapter
Online/Offline OR Composition of Sigma Protocols
In Advances in Cryptology – EUROCRYPT 2016 (pp. 63–92).
2015 chapter
Improved OR-Composition of Sigma-Protocols
In Lecture Notes in Computer Science: Vol. 9563. Theory of Cryptography. TCC 2016 (pp. 112–141).
2015 chapter
Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way
In Theory of Cryptography (pp. 345–374).
2015 chapter
Round-Optimal Black-Box Two-Party Computation
In Lecture Notes in Computer Science (pp. 339–358).
2013 chapter
Revisiting Lower and Upper Bounds for Selective Decommitments
In Theory of Cryptography (pp. 559–578).
2013 chapter
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
In Advances in Cryptology - ASIACRYPT 2013 (pp. 100–119).
2013 chapter
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
In Advances in Cryptology – EUROCRYPT 2013 (pp. 702–718).
2012 chapter
On Round-Optimal Zero Knowledge in the Bare Public-Key Model
In Advances in Cryptology – EUROCRYPT 2012 (pp. 153–171).
2012 chapter
Simultaneously Resettable Arguments of Knowledge
In Theory of Cryptography (pp. 530–547).
2010 chapter
Impossibility Results for RFID Privacy Notions
In Transactions on Computational Science XI (pp. 39–63).
2009 chapter
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
In Algorithmic Aspects of Wireless Sensor Networks (pp. 76–87).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.