Author of the publication

Heuristics for Finding Large Independent Sets, with Applications to Coloring Semi-Random Graphs.

, and . FOCS, page 674-683. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weakening Security Assumptions and Oblivious Transfer (Abstract)., and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 2-7. Springer, (1988)On the Power of Sigmoid Neural Networks., and . COLT, page 137-143. ACM, (1993)A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 198-215. Springer, (2008)Extending Oblivious Transfers Efficiently., , , and . CRYPTO, volume 2729 of Lecture Notes in Computer Science, page 145-161. Springer, (2003)On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 56-73. Springer, (1999)On the Concurrent Composition of Zero-Knowledge Proofs., and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 415-431. Springer, (1999)Efficient Identification Schemes Using Two Prover Interactive Proofs., , , and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 498-506. Springer, (1989)Identity Escrow., and . CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 169-185. Springer, (1998)Heuristics for Finding Large Independent Sets, with Applications to Coloring Semi-Random Graphs., and . FOCS, page 674-683. IEEE Computer Society, (1998)Lower Bounds for Zero Knowledge on the Internet., , and . FOCS, page 484-492. IEEE Computer Society, (1998)