Author of the publication

08491 Abstracts Collection - Theoretical Foundations of Practical Information Security.

, , , and . Theoretical Foundations of Practical Information Security, volume 08491 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Complexity of Decision Versus Search., and . SIAM J. Comput., 23 (1): 97-119 (1994)How to Compute in the Presence of Leakage., and . SIAM J. Comput., 44 (5): 1480-1549 (2015)Bounded-Collusion IBE from Key Homomorphism., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 564-581. Springer, (2012)Secure Computation without Agreement., and . DISC, volume 2508 of Lecture Notes in Computer Science, page 17-32. Springer, (2002)Pseudo-deterministic Algorithms (Invited Talk).. STACS, volume 14 of LIPIcs, page 29-29. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)The Complexity of Problems in P Given Correlated Instances., and . ITCS, volume 67 of LIPIcs, page 13:1-13:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Leakage-resilient coin tossing., , and . Distributed Comput., 27 (3): 147-164 (2014)Functional Signatures and Pseudorandom Functions., , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 501-519. Springer, (2014)On the Limits of Nonapproximability of Lattice Problems., and . J. Comput. Syst. Sci., 60 (3): 540-563 (2000)On the Limits of Non-Approximability of Lattice Problems., and . STOC, page 1-9. ACM, (1998)