Author of the publication

Connections between the Complexity of Unique Satisfiability and the Threshold Behavior of Randomized Reductions.

, , and . SCT, page 255-269. IEEE Computer Society, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Sound Approaches to Counteract Power-Analysis Attacks., , , and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 398-412. Springer, (1999)On Unique Staisfiability and Randomized Reductions., and . Bull. EATCS, (1990)Policy Evolution with Grammatical Evolution., , , and . SEAL, volume 5361 of Lecture Notes in Computer Science, page 71-80. Springer, (2008)Trojan Detection using IC Fingerprinting., , , , and . S&P, page 296-310. IEEE Computer Society, (2007)Relativization: a Revisionistic Retrospective., , , , and . Current Trends in Theoretical Computer Science, volume 40 of World Scientific Series in Computer Science, World Scientific, (1993)Side-Channel Protections for Cryptographic Instruction Set Extensions., , and . IACR Cryptology ePrint Archive, (2016)EMpowering Side-Channel Attacks., and . IACR Cryptology ePrint Archive, (2001)A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication.. ACM Conference on Computer and Communications Security, page 93-100. ACM, (1999)On Unique Satisfiability and the Threshold Behavior of Randomized Reductions., , and . J. Comput. Syst. Sci., 50 (3): 359-373 (1995)A survey of security issues in multicast communications., , and . IEEE Netw., 13 (6): 12-23 (1999)