Secure two-party threshold ECDSA from ECDSA assumptions J Doerner, Y Kondi, E Lee, A Shelat 2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018 | 168 | 2018 |
Threshold ECDSA from ECDSA assumptions: The multiparty case J Doerner, Y Kondi, E Lee, A Shelat 2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019 | 150 | 2019 |
Multiparty generation of an RSA modulus M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen Journal of Cryptology 35 (2), 12, 2022 | 41 | 2022 |
abhi shelat. Secure two-party threshold ECDSA from ECDSA assumptions J Doerner, Y Kondi, E Lee 2018 IEEE Symposium on Security and Privacy, 980-997, 0 | 20 | |
Threshold bbs+ signatures for distributed anonymous credential issuance J Doerner, Y Kondi, E Lee, A Shelat, LK Tyner 2023 IEEE Symposium on Security and Privacy (SP), 773-789, 2023 | 18 | 2023 |
Circuit amortization friendly encodingsand their application to statistically secure multiparty computation A Dalskov, E Lee, E Soria-Vazquez International Conference on the Theory and Application of Cryptology and …, 2020 | 18 | 2020 |
Threshold ECDSA in Three Rounds J Doerner, Y Kondi, E Lee Cryptology ePrint Archive, 2023 | 9 | 2023 |
Signature schemes with randomized verification C Freitag, R Goyal, S Hohenberger, V Koppula, E Lee, T Okamoto, J Tran, ... International Conference on Applied Cryptography and Network Security, 373-389, 2017 | 5 | 2017 |
Cryptographers’ Feedback on the EU Digital Identity’s ARF C Baum, O Blazy, J Camenisch, JH Hoepman, E Lee, A Lehmann, ... | | 2024 |
Securely Computing Threshold Variants of Signature Schemes (and More!) E Lee Northeastern University, 2023 | | 2023 |