From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Power of Sigmoid Neural Networks., и . COLT, стр. 137-143. ACM, (1993)Extending Oblivious Transfers Efficiently., , , и . CRYPTO, том 2729 из Lecture Notes in Computer Science, стр. 145-161. Springer, (2003)A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting., и . ASIACRYPT, том 5350 из Lecture Notes in Computer Science, стр. 198-215. Springer, (2008)On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions., , и . EUROCRYPT, том 1592 из Lecture Notes in Computer Science, стр. 56-73. Springer, (1999)On the Concurrent Composition of Zero-Knowledge Proofs., и . EUROCRYPT, том 1592 из Lecture Notes in Computer Science, стр. 415-431. Springer, (1999)Weakening Security Assumptions and Oblivious Transfer (Abstract)., и . CRYPTO, том 403 из Lecture Notes in Computer Science, стр. 2-7. Springer, (1988)Identity Escrow., и . CRYPTO, том 1462 из Lecture Notes in Computer Science, стр. 169-185. Springer, (1998)Efficient Identification Schemes Using Two Prover Interactive Proofs., , , и . CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 498-506. Springer, (1989)Heuristics for Finding Large Independent Sets, with Applications to Coloring Semi-Random Graphs., и . FOCS, стр. 674-683. IEEE Computer Society, (1998)Lower Bounds for Zero Knowledge on the Internet., , и . FOCS, стр. 484-492. IEEE Computer Society, (1998)