From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Separations in Circular Security for Arbitrary Length Key Cycles., , и . TCC (2), том 9015 из Lecture Notes in Computer Science, стр. 378-400. Springer, (2015)Adaptive Multiparty NIKE., , и . TCC (2), том 13748 из Lecture Notes in Computer Science, стр. 244-273. Springer, (2022)Deterministic Public-Key Encryption Under Continual Leakage., , , и . ACNS, том 9696 из Lecture Notes in Computer Science, стр. 304-323. Springer, (2016)Adaptively Secure Constrained Pseudorandom Functions., , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 357-376. Springer, (2019)Simpler Proofs of Quantumness., , , и . TQC, том 158 из LIPIcs, стр. 8:1-8:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Universal Samplers with Fast Verification., , и . Public Key Cryptography (2), том 10175 из Lecture Notes in Computer Science, стр. 525-554. Springer, (2017)Collusion Resistant Traitor Tracing from Learning with Errors., , и . SIAM J. Comput., (2020)Collusion resistant traitor tracing from learning with errors., , и . STOC, стр. 660-670. ACM, (2018)NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations., , и . CRYPTO (3), том 12172 из Lecture Notes in Computer Science, стр. 738-767. Springer, (2020)Semi-adaptive Security and Bundling Functionalities Made Generic and Easy., , и . TCC (B2), том 9986 из Lecture Notes in Computer Science, стр. 361-388. (2016)