From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Special Section on the Forty-Fifth Annual ACM Symposium on the Theory of Computing (STOC 2013)., , и . SIAM J. Comput., 45 (2): 459-460 (2016)The complexity of information theoretic secure computation.. ITW, стр. 80. IEEE, (2012)On Pseudorandom Generators with Linear Stretch in NC0., , и . Comput. Complex., 17 (1): 38-69 (2008)Secure Multiparty Computation with Sublinear Preprocessing., , , и . EUROCRYPT (1), том 13275 из Lecture Notes in Computer Science, стр. 427-457. Springer, (2022)Oblivious Transfer with Constant Computational Overhead., , , , , , и . EUROCRYPT (1), том 14004 из Lecture Notes in Computer Science, стр. 271-302. Springer, (2023)Function Secret Sharing., , и . EUROCRYPT (2), том 9057 из Lecture Notes in Computer Science, стр. 337-367. Springer, (2015)Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation., , , , , , и . EUROCRYPT (2), том 12697 из Lecture Notes in Computer Science, стр. 871-900. Springer, (2021)Function Secret Sharing: Improvements and Extensions., , и . ACM Conference on Computer and Communications Security, стр. 1292-1303. ACM, (2016)Semantic Security under Related-Key Attacks and Applications., , и . ICS, стр. 45-60. Tsinghua University Press, (2011)Bounded Indistinguishability and the Complexity of Recovering Secrets., , , и . Electron. Colloquium Comput. Complex., (2015)