Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Congestion Cycle Covers and their Applications., and . CoRR, (2018)On Distributional Collision Resistant Hashing., and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 303-327. Springer, (2018)Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions., , and . J. Cryptol., 31 (1): 60-100 (2018)A PCP Theorem for Interactive Proofs., , and . IACR Cryptol. ePrint Arch., (2021)Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS., , , , , and . IACR Cryptol. ePrint Arch., (2022)The Power of Distributed Verifiers in Interactive Proofs., , and . Electron. Colloquium Comput. Complex., (2018)Transparent Error Correcting in a Computationally Bounded World., , and . TCC (3), volume 12552 of Lecture Notes in Computer Science, page 530-549. Springer, (2020)The Adversarial Robustness of Sampling., and . PODS, page 49-62. ACM, (2020)Interactive Proofs for Social Graphs., , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 574-601. Springer, (2020)Tight Bounds for Sliding Bloom Filters., and . Algorithmica, 73 (4): 652-672 (2015)