Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bloom Filters in Adversarial Environments., and . ACM Trans. Algorithms, 15 (3): 35:1-35:30 (2019)Mirror games against an open book player., and . Theor. Comput. Sci., (October 2023)The Probabilistic Method Yields Deterministic Parallel Algorithms., , and . J. Comput. Syst. Sci., 49 (3): 478-516 (1994)Revocation and Tracing Schemes for Stateless Receivers, , and . Electron. Colloquium Comput. Complex., (2002)Communication Complexity and Secure Function Evaluation, and . Electron. Colloquium Comput. Complex., (2001)On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited, and . Electron. Colloquium Comput. Complex., (1997)Derandomized Constructions of k-Wise (Almost) Independent Permutations, , and . Electron. Colloquium Comput. Complex., (2006)Untraceable Electronic Cash., , and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 319-327. Springer, (1988)Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery., , and . ITC, volume 163 of LIPIcs, page 9:1-9:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users., and . FORC, volume 156 of LIPIcs, page 4:1-4:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)