From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Per-Session Security: Password-Based Cryptography Revisited., , , и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 408-426. Springer, (2017)Common randomness amplification: A constructive view., и . ITW, стр. 35-39. IEEE, (2012)Unfair coin tossing., и . ISIT, стр. 1556-1560. IEEE, (2013)Query-Complexity Amplification for Random Oracles., , , и . ICITS, том 9063 из Lecture Notes in Computer Science, стр. 159-180. Springer, (2015)Resource-Restricted Indifferentiability., , , и . EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 664-683. Springer, (2013)Optimality of non-adaptive strategies: The case of parallel games., , , и . ISIT, стр. 1707-1711. IEEE, (2014)Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source., , и . ISITA, стр. 589-594. IEEE, (2010)Per-session security: Password-based cryptography revisited., , , и . J. Comput. Secur., 27 (1): 75-111 (2019)Rate Distortion Bounds for Binary Erasure Source Using Sparse Graph Codes., , и . DCC, стр. 49-58. IEEE Computer Society, (2010)