Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control., and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 97-123. Springer, (2020)Boosting Batch Arguments and RAM Delegation., , , and . STOC, page 1545-1552. ACM, (2023)Rate-1 Non-Interactive Arguments for Batch-NP and Applications., , , and . FOCS, page 1057-1068. IEEE, (2022)Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples., , , and . NeurIPS, (2020)SNARGs under LWE via Propositional Proofs., , , and . STOC, page 1750-1757. ACM, (2024)Interactive Coding with Constant Round and Communication Blowup., , and . Electron. Colloquium Comput. Complex., (2018)Quantum Advantage from Any Non-local Game., , , and . STOC, page 1617-1628. ACM, (2023)Probabilistically Checkable Arguments., and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 143-159. Springer, (2009)On Obfuscation with Random Oracles., , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 456-467. Springer, (2015)Delegating RAM Computations., and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 91-118. (2016)