Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounded Independence versus Symmetric Tests., , , and . TOCT, 11 (4): 21:1-21:27 (2019)Following a tangent of proofs.. Providing Sound Foundations for Cryptography, ACM, (2019)The square lattice shuffle, correction.. Random Struct. Algorithms, 48 (1): 213 (2016)The square lattice shuffle.. Random Struct. Algorithms, 29 (4): 466-474 (2006)Solving Simultaneous Modular Equations of Low Degree.. SIAM J. Comput., 17 (2): 336-341 (1988)The security of all RSA and discrete log bits., and . J. ACM, 51 (2): 187-230 (2004)Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers., and . PQCrypto, volume 10346 of Lecture Notes in Computer Science, page 347-363. Springer, (2017)Some Recent Strong Inapproximability Results.. SWAT, volume 1432 of Lecture Notes in Computer Science, page 205-209. Springer, (1998)The Shrinkage Exponent of de Morgan Formulas is 2.. SIAM J. Comput., 27 (1): 48-64 (1998)On the Approximation Resistance of a Random Predicate.. Comput. Complex., 18 (3): 413-434 (2009)