From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secrecy without one-way functions., и . Groups Complexity Cryptology, 5 (1): 31-52 (2013)Computational Complexity of Sparse Rational Interpolation., , и . SIAM J. Comput., 23 (1): 1-11 (1994)On the Power of Real Turing Machines Over Binary Inputs., и . SIAM J. Comput., 26 (1): 243-254 (1997)No-leak authentication by the Sherlock Holmes method., и . Groups Complexity Cryptology, 4 (1): 177-189 (2012)Absolute factoring of non-holonomic ideals in the plane., и . ISSAC, стр. 93-97. ACM, (2010)Tropical cryptography II: extensions by homomorphisms., и . CoRR, (2018)A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors)., , и . ICMS, том 10931 из Lecture Notes in Computer Science, стр. 45-54. Springer, (2018)Deviation Theorems for Solutions of Differential Equations and Applications to Lower Bounds on Parallel Complexity of Sigmoids.. Theor. Comput. Sci., 133 (1): 23-33 (1994)Complexity in Tropical Algebra (Invited Talk).. CASC, том 8136 из Lecture Notes in Computer Science, стр. 148-154. Springer, (2013)Exponential Lower Bound for Static Semi-algebraic Proofs., , и . ICALP, том 2380 из Lecture Notes in Computer Science, стр. 257-268. Springer, (2002)