From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to pair with a human.. IACR Cryptol. ePrint Arch., (2009)Leakage-Resilient Cryptography From the Inner-Product Extractor., и . IACR Cryptol. ePrint Arch., (2011)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , и . J. Cryptol., 32 (1): 151-177 (2019)One-time Computable and Uncomputable Functions., , и . IACR Cryptology ePrint Archive, (2010)Efficient Multiparty Computations Secure Against an Adaptive Adversary., , , , и . EUROCRYPT, том 1592 из Lecture Notes in Computer Science, стр. 311-326. Springer, (1999)On the complexity of verifiable secret sharing and multiparty computation., , и . STOC, стр. 325-334. ACM, (2000)How Much Memory is Needed to Win Infinite Games?, , и . LICS, стр. 99-110. IEEE Computer Society, (1997)Bounded-Retrieval Model with Keys Derived from Private Data., , , , и . Inscrypt, том 10143 из Lecture Notes in Computer Science, стр. 273-290. Springer, (2016)Individual Cryptography., , и . CRYPTO (2), том 14082 из Lecture Notes in Computer Science, стр. 547-579. Springer, (2023)Tight security proofs for the bounded-storage model., и . STOC, стр. 341-350. ACM, (2002)