Author of the publication

How Did They Design This Game? Swish: Complexity and Unplayable Positions.

, , and . FUN, volume 291 of LIPIcs, page 10:1-10:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Physical Zero-Knowledge Proof for Norinori., , , , , and . COCOON, volume 11653 of Lecture Notes in Computer Science, page 166-177. Springer, (2019)Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes., , and . IACR Cryptol. ePrint Arch., (2021)Fast Cramer-Shoup Cryptosystem., , and . SECRYPT, page 766-771. SCITEPRESS, (2021)Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Opaque Robots with Common Chirality., , and . ICDCN, page 76-85. ACM, (2021)Samba: A System for Secure Federated Multi-Armed Bandits., , , , and . ICDE, page 3154-3157. IEEE, (2022)RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version)., , and . IACR Cryptol. ePrint Arch., (2022)How Did They Design This Game? Swish: Complexity and Unplayable Positions., , and . FUN, volume 291 of LIPIcs, page 10:1-10:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)Secure Strassen-Winograd Matrix Multiplication with MapReduce., , , and . ICETE (2), page 220-227. SciTePress, (2019)Secure Intersection with MapReduce., , , and . ICETE (2), page 236-243. SciTePress, (2019)No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 253-277. Springer, (2017)