Publications

Note: the order of the papers here is according to the year of the conference in which the paper was presented.

Session-Key Generation using Human Passwords Only

Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation

Resettably-Sound Zero-Knowledge and its Applications

Skip to content