From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How To Simulate It - A Tutorial on the Simulation Proof Technique.. IACR Cryptology ePrint Archive, (2016)A Practical Application of Differential Privacy to Personalized Online Advertising., и . IACR Cryptology ePrint Archive, (2011)Information-Theoretically Secure Protocols and Security Under Composition., , и . IACR Cryptology ePrint Archive, (2009)Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs., и . IACR Cryptology ePrint Archive, (2007)Information-theoretically secure protocols and security under composition., , и . STOC, стр. 109-118. ACM, (2006)Secure Two-Party Computation with Fairness - A Necessary Design Principle., и . TCC (1), том 10677 из Lecture Notes in Computer Science, стр. 565-580. Springer, (2017)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , и . TCC, том 4392 из Lecture Notes in Computer Science, стр. 323-341. Springer, (2007)Lower Bounds for Concurrent Self Composition.. TCC, том 2951 из Lecture Notes in Computer Science, стр. 203-222. Springer, (2004)On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions., , и . EUROCRYPT, том 2656 из Lecture Notes in Computer Science, стр. 68-86. Springer, (2003)Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption.. EUROCRYPT, том 6632 из Lecture Notes in Computer Science, стр. 446-466. Springer, (2011)