From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds., , , и . CRYPTO, том 6841 из Lecture Notes in Computer Science, стр. 277-296. Springer, (2011)Learning Boxes in High Dimension., и . EuroCOLT, том 1208 из Lecture Notes in Computer Science, стр. 3-15. Springer, (1997)On Matroids and Non-ideal Secret Sharing., и . TCC, том 3876 из Lecture Notes in Computer Science, стр. 482-501. Springer, (2006)Multi-linear Secret-Sharing Schemes., , , и . TCC, том 8349 из Lecture Notes in Computer Science, стр. 394-418. Springer, (2014)Reliable Communication over Partially Authenticated Networks., и . WDAG, том 1320 из Lecture Notes in Computer Science, стр. 245-259. Springer, (1997)RT oblivious erasure correcting., , и . IEEE/ACM Trans. Netw., 15 (6): 1321-1332 (2007)Secure schemes for secret sharing and key distribution.. Technion - Israel Institute of Technology, Israel, (1996)Quadratic Secret Sharing and Conditional Disclosure of Secrets., , и . IEEE Trans. Inf. Theory, 69 (11): 7295-7316 (ноября 2023)Share Conversion and Private Information Retrieval., , , и . CCC, стр. 258-268. IEEE Computer Society, (2012)Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs.. ITC, том 267 из LIPIcs, стр. 16:1-16:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)