From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leakage-resilient coin tossing., , и . Distributed Comput., 27 (3): 147-164 (2014)Functional Signatures and Pseudorandom Functions., , и . Public Key Cryptography, том 8383 из Lecture Notes in Computer Science, стр. 501-519. Springer, (2014)A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks., , и . SIAM J. Comput., 17 (2): 281-308 (1988)A (de)constructive approach to program checking., , , , и . STOC, стр. 143-152. ACM, (2008)On the power of interaction., , и . Combinatorica, 10 (1): 3-25 (1990)Pseudo-deterministic Algorithms (Invited Talk).. STACS, том 14 из LIPIcs, стр. 29-29. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)The Complexity of Problems in P Given Correlated Instances., и . ITCS, том 67 из LIPIcs, стр. 13:1-13:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)How to Incentivize Data-Driven Collaboration Among Competing Parties., , и . IACR Cryptology ePrint Archive, (2015)A Note on the Impossibility of Obfuscation with Auxiliary Input., и . IACR Cryptology ePrint Archive, (2013)Verifiable Partial Key Escrow., и . IACR Cryptology ePrint Archive, (1996)