From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On achieving the "best of both worlds" in secure multiparty computation.. STOC, стр. 11-20. ACM, (2007)Scalable Protocols for Authenticated Group Key Exchange., и . CRYPTO, том 2729 из Lecture Notes in Computer Science, стр. 110-125. Springer, (2003)Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions., , , и . TCC, том 6597 из Lecture Notes in Computer Science, стр. 559-578. Springer, (2011)Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation., и . FSE, том 1978 из Lecture Notes in Computer Science, стр. 284-299. Springer, (2000)Complete Fairness in Multi-Party Computation Without an Honest Majority., и . IACR Cryptology ePrint Archive, (2008)Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications.. EUROCRYPT, том 2656 из Lecture Notes in Computer Science, стр. 211-228. Springer, (2003)Which Languages Have 4-Round Zero-Knowledge Proofs?. TCC, том 4948 из Lecture Notes in Computer Science, стр. 73-88. Springer, (2008)One-Round Protocols for Two-Party Authenticated Key Exchange., , и . ACNS, том 3089 из Lecture Notes in Computer Science, стр. 220-232. Springer, (2004)Parallel and Concurrent Security of the HB and HB$^+$ Protocols, , и . J. Cryptology, 23 (3): 402-421 (2010)Poststratification without population level information on the poststratifying variable with application to political polling, , и . J. Amer. Statist. Assoc., 96 (453): 1--11 (2001)