From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A generalization of Schönemann's theorem via a graph theoretic method., , и . CoRR, (2017)Reproducible Circularly-Secure Bit Encryption: Applications and Realizations., и . CRYPTO (1), том 9215 из Lecture Notes in Computer Science, стр. 224-243. Springer, (2015)A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC)., , и . ICALP, том 4596 из Lecture Notes in Computer Science, стр. 328-339. Springer, (2007)Lower bound for scalable Byzantine Agreement., , и . Distributed Comput., 21 (4): 239-248 (2008)Restricted linear congruences and an authenticated encryption scheme., , , , и . CoRR, (2015)MMH* with arbitrary modulus is always almost-universal., , и . CoRR, (2020)On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes., , и . Public Key Cryptography (2), том 9615 из Lecture Notes in Computer Science, стр. 129-158. Springer, (2016)Zero-One Laws for Modal Logic., и . Ann. Pure Appl. Log., 69 (2-3): 157-193 (1994)Higher-order Complexity Theory and its Applications (NII Shonan Meeting 151)., , и . NII Shonan Meet. Rep., (2019)Complexity of social network anonymization., , , и . Soc. Netw. Anal. Min., 3 (2): 151-166 (2013)