Volgen
Eysa Lee
Eysa Lee
Geverifieerd e-mailadres voor brown.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
1692018
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
1402019
Multiparty generation of an RSA modulus
M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen
Journal of Cryptology 35 (2), 12, 2022
362022
Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
A Dalskov, E Lee, E Soria-Vazquez
International Conference on the Theory and Application of Cryptology and …, 2020
172020
Threshold bbs+ signatures for distributed anonymous credential issuance
J Doerner, Y Kondi, E Lee, A Shelat, LK Tyner
2023 IEEE Symposium on Security and Privacy (SP), 773-789, 2023
142023
Threshold ECDSA in Three Rounds
J Doerner, Y Kondi, E Lee
Cryptology ePrint Archive, 2023
72023
A. shelat,“
J Doerner, Y Kondi, E Lee
Scaling ORAM for secure computation,” in CCS 17, 2019
52019
Signature schemes with randomized verification
C Freitag, R Goyal, S Hohenberger, V Koppula, E Lee, T Okamoto, J Tran, ...
International Conference on Applied Cryptography and Network Security, 373-389, 2017
52017
Securely Computing Threshold Variants of Signature Schemes (and More!)
E Lee
Northeastern University, 2023
2023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–9