From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol., , , , и . ICSNC, стр. 26. IEEE Computer Society, (2006)Practical Attacks on HB and HB+ Protocols., , , и . WISTP, том 6633 из Lecture Notes in Computer Science, стр. 244-253. Springer, (2011)Statistical Testing of PRNG: Generalized Gambler's Ruin Problem., , и . MACIS, том 10693 из Lecture Notes in Computer Science, стр. 425-437. Springer, (2017)Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications., , и . ACNS (3), том 14585 из Lecture Notes in Computer Science, стр. 3-27. Springer, (2024)Conditional Digital Signatures., , , и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 206-215. Springer, (2005)VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections., , , , , , , , , и 1 other автор(ы). IACR Cryptol. ePrint Arch., (2022)Anonymous Communication with On-line and Off-line Onion Encoding., , и . SOFSEM, том 3381 из Lecture Notes in Computer Science, стр. 229-238. Springer, (2005)Self-stabilizing population of mobile agents., , , и . IPDPS, стр. 1-8. IEEE, (2008)PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit., , и . CoRR, (2022)On testing pseudorandom generators via statistical tests based on the arcsine law., , , и . J. Comput. Appl. Math., (2020)