Author of the publication

Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Round Complexity of Proofs in the Bounded Quantum Storage Model., and . CoRR, (2024)Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement., , and . Quantum, (2024)Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)The Round Complexity of Proofs in the Bounded Quantum Storage Model., and . IACR Commun. Cryptol., 2 (1): 3 (2025)Streamflow modelling and forecasting for Canadian watersheds using LSTM networks with attention mechanism., , , , , , and . Neural Comput. Appl., 34 (22): 19995-20015 (2022)Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 282-314. Springer, (2018)Deletion-Compliance in the Absence of Privacy., and . PST, page 1-10. IEEE, (2021)Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications., , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)A high-performance ray tracing particle tracking model for the simulation of microplastics in inland and coastal aquatic environments., , , , , and . Comput. Phys. Commun., (2025)Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes., , and . ACNS (1), volume 15825 of Lecture Notes in Computer Science, page 369-397. Springer, (2025)