Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Property Testing and its Connection to Learning and Approximation, , and . J. ACM, 45 (4): 653-750 (1998)One-Time Programs., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 39-56. Springer, (2008)Athena lecture: Controlling Access to Programs?. STOC, page 167-168. ACM, (2009)On the possibilities and limitations of pseudodeterministic algorithms., , and . ITCS, page 127-138. ACM, (2013)Efficient Interactive Proofs and Applications to Approximation.. ISTCS, page 1-2. IEEE Computer Society, (1993)Probabilistic encryption & how to play mental poker keeping secret all partial information., and . Providing Sound Foundations for Cryptography, ACM, (2019)The knowledge complexity of interactive proof-systems., , and . Providing Sound Foundations for Cryptography, ACM, (2019)Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes., and . TCC, volume 2951 of Lecture Notes in Computer Science, page 77-100. Springer, (2004)Bipartite Perfect Matching in Pseudo-Deterministic NC., and . ICALP, volume 80 of LIPIcs, page 87:1-87:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Multi-Party Computations: Past and Present.. PODC, page 1-6. ACM, (1997)