Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More Constructions of Lossy and Correlation-Secure Trapdoor Functions., , , , and . IACR Cryptology ePrint Archive, (2009)Preface to "Week Three: Randomness in Computation".. Computational Complexity Theory, volume 10 of IAS / Park City mathematics series, AMS Chelsea Publishing, (2004)The Minimum-Length Generator Sequence Problem is NP-Hard., and . J. Algorithms, 2 (3): 311-313 (1981)Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs., , , and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 325-338. Springer, (1995)On some noncryptographic works of Goldwasser and Micali.. Providing Sound Foundations for Cryptography, ACM, (2019)Preface.. Providing Sound Foundations for Cryptography, ACM, (2019)Preface to the Special Issue from Random'06.. Comput. Complex., 17 (1): 1-2 (2008)Hierarchy Theorems for Property Testing., , , and . Comput. Complex., 21 (1): 129-192 (2012)Worst-Case to Average-Case Reductions for Subclasses of P., and . Computational Complexity and Property Testing, volume 12050 of Lecture Notes in Computer Science, Springer, (2020)On the Relation Between the Relative Earth Mover Distance and the Variation Distance (an Exposition)., and . Computational Complexity and Property Testing, volume 12050 of Lecture Notes in Computer Science, Springer, (2020)