Author of the publication

"Practical IP" <= MA.

, and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 580-582. Springer, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sorting out Zero-Knowledge., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 181-191. Springer, (1989)Experimental Quantum Cryptography., , , , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 253-265. Springer, (1990)Secure Implementations of Identification Systems., , , , and . J. Cryptol., 4 (3): 175-183 (1991)Crusade for a better notation.. SIGACT News, 17 (1): 60-64 (1985)Brief history of quantum cryptography: a personal perspective.. ICITS, page 19-23. IEEE, (2005)Cryptology - column 4: hiding information from oracles.. SIGACT News, 21 (2): 5 (1990)Cryptology Column: The Book I've Always Wanted To Write (Almost).. SIGACT News, 26 (2): 18-20 (1995)Cryptology in Academia: A Ten Year Retrospective.. COMPCON, page 222-226. IEEE Computer Society, (1987)Quantum Computing Without Entanglement, , , and . (June 2003)Oblivious Transfers and Privacy Amplification., , and . J. Cryptol., 16 (4): 219-237 (2003)