From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to leverage hardness of constant degree expanding polynomials over R to build iO., , , и . IACR Cryptology ePrint Archive, (2019)Simplifying Constructions and Assumptions for i풪., , и . IACR Cryptology ePrint Archive, (2019)Sum-of-Squares Meets Program Obfuscation, Revisited., , , , и . EUROCRYPT (1), том 11476 из Lecture Notes in Computer Science, стр. 226-250. Springer, (2019)Performance analysis of non-banking finance companies using two-stage data envelopment analysis., , и . Ann. Oper. Res., 295 (1): 91-116 (2020)Reproducibility Report Path Planning using Neural A* Search., , , , и . CoRR, (2022)Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i풪., , , и . IACR Cryptol. ePrint Arch., (2022)Hyperspectral Domain Adaptation for the Detection of Material Types in Recycling Streams at the Example of Electrolyzers., , , , и . IGARSS, стр. 7618-7620. IEEE, (2023)From FE Combiners to Secure MPC and Back., , , , и . TCC (1), том 11891 из Lecture Notes in Computer Science, стр. 199-228. Springer, (2019)Adaptive latent fingerprint segmentation using feature selection and random decision forest classification., , , , и . Inf. Fusion, (2017)Combiners for Functional Encryption, Unconditionally., , и . EUROCRYPT (1), том 12105 из Lecture Notes in Computer Science, стр. 141-168. Springer, (2020)