Author of the publication

Type-two Iteration with Bounded Query Revision.

, and . DICE-FOPARA@ETAPS, volume 298 of EPTCS, page 61-73. (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generalization of Schönemann's theorem via a graph theoretic method., , and . CoRR, (2017)Zero-One Laws for Modal Logic., and . Ann. Pure Appl. Log., 69 (2-3): 157-193 (1994)Lower bound for scalable Byzantine Agreement., , and . Distributed Comput., 21 (4): 239-248 (2008)On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes., , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 129-158. Springer, (2016)Restricted linear congruences and an authenticated encryption scheme., , , , and . CoRR, (2015)MMH* with arbitrary modulus is always almost-universal., , and . CoRR, (2020)A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC)., , and . ICALP, volume 4596 of Lecture Notes in Computer Science, page 328-339. Springer, (2007)Reproducible Circularly-Secure Bit Encryption: Applications and Realizations., and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 224-243. Springer, (2015)Higher-order Complexity Theory and its Applications (NII Shonan Meeting 151)., , and . NII Shonan Meet. Rep., (2019)Complexity of social network anonymization., , , and . Soc. Netw. Anal. Min., 3 (2): 151-166 (2013)