Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Quantum Shannon Impossibility for Quantum Encryption., and . CoRR, (2018)Computational Notions of Quantum Min-Entropy., , , , and . CoRR, (2017)Foundations of Differentially Oblivious Algorithms., , , and . IACR Cryptology ePrint Archive, (2017)On the Sample Complexity of PAC Learning Quantum Process., and . CoRR, (2018)On the Algorithmic Power of Spiking Neural Networks., , and . ITCS, volume 124 of LIPIcs, page 26:1-26:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Efficient String-Commitment from Weak Bit-Commitment., , , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 268-282. Springer, (2010)On statistically-secure quantum homomorphic encryption., and . Quantum Inf. Comput., 18 (9&10): 785-794 (2018)Quantum encryption and generalized Shannon impossibility., and . Des. Codes Cryptogr., 87 (9): 1961-1972 (2019)Foundations of Differentially Oblivious Algorithms., , , and . J. ACM, 69 (4): 27:1-27:49 (2022)Multi-Source Randomness Extractors Against Quantum Side Information, and their Applications., , and . Electron. Colloquium Comput. Complex., (2014)