Author of the publication

Witness-Based Cryptographic Program Checking and Robust Function Sharing.

, , and . STOC, page 499-508. ACM, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selection in the Presence of Noise: The Design of Playoff Systems., , , , and . SODA, page 564-572. ACM/SIAM, (1994)Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change., , and . SODA, page 457-466. ACM/SIAM, (1995)Efficient and Fresh Cerification., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 342-353. Springer, (2000)Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack., and . J. Cryptol., 15 (2): 139-148 (2002)Tight Bounds on Expected Time to Add Correctly and Add Mostly Correctly., and . Inf. Process. Lett., 49 (2): 77-83 (1994)Checking approximate computations over the reals., , , and . STOC, page 786-795. ACM, (1993)Self-Testing/Correcting for Polynomials and for Approximate Functions, , , , and . STOC, page 32-42. ACM, (1991)On the Cryptographic Value of The qth Root Problem., , , and . ICICS, volume 1726 of Lecture Notes in Computer Science, page 135-142. Springer, (1999)Checking Properties of Polynomials (Extended Abstract)., , , and . ICALP, volume 1256 of Lecture Notes in Computer Science, page 203-213. Springer, (1997)Codes for Interactive Authentication., and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 355-367. Springer, (1993)