From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , и . J. Cryptol., 32 (1): 151-177 (2019)Leakage-Resilient Cryptography From the Inner-Product Extractor., и . IACR Cryptol. ePrint Arch., (2011)Individual Cryptography., , и . CRYPTO (2), том 14082 из Lecture Notes in Computer Science, стр. 547-579. Springer, (2023)How Much Memory is Needed to Win Infinite Games?, , и . LICS, стр. 99-110. IEEE Computer Society, (1997)On the complexity of verifiable secret sharing and multiparty computation., , и . STOC, стр. 325-334. ACM, (2000)Efficient Multiparty Computations Secure Against an Adaptive Adversary., , , , и . EUROCRYPT, том 1592 из Lecture Notes in Computer Science, стр. 311-326. Springer, (1999)Bounded-Retrieval Model with Keys Derived from Private Data., , , , и . Inscrypt, том 10143 из Lecture Notes in Computer Science, стр. 273-290. Springer, (2016)Distributed Cryptography Based on the Proofs of Work., и . IACR Cryptology ePrint Archive, (2014)Optimal Amplification of Noisy Leakages., , и . TCC (A2), том 9563 из Lecture Notes in Computer Science, стр. 291-318. Springer, (2016)Bounded-Variable Fixpoint Queries are PSPACE-complete.. CSL, том 1258 из Lecture Notes in Computer Science, стр. 89-105. Springer, (1996)