Author of the publication

Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Streamflow modelling and forecasting for Canadian watersheds using LSTM networks with attention mechanism., , , , , , and . Neural Comput. Appl., 34 (22): 19995-20015 (2022)Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)Internet of Things Based Contact Tracing Systems., and . Sensors, 21 (21): 7124 (2021)Towards a robust and trustworthy machine learning system development: An engineering perspective., , , , , and . J. Inf. Secur. Appl., (2022)Deletion-Compliance in the Absence of Privacy., and . IACR Cryptol. ePrint Arch., (2022)Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement., , and . IACR Cryptol. ePrint Arch., (2022)Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 282-314. Springer, (2018)Deletion-Compliance in the Absence of Privacy., and . PST, page 1-10. IEEE, (2021)Towards a Robust and Trustworthy Machine Learning System Development., , , , , and . CoRR, (2021)Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications., , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)