Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proofs of Quantumness from Trapdoor Permutations., and . ITCS, volume 251 of LIPIcs, page 87:1-87:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Modified group non-membership is in AWPP., , and . CoRR, (2016)Rational proofs for quantum computing., and . CoRR, (2018)Impossibility of Classically Simulating One-Clean-Qubit Computation., , , , , and . CoRR, (2014)Quantum Commuting Circuits and Complexity of Ising Partition Functions., and . CoRR, (2013)Power of Quantum Computation with Few Clean Qubits., , , , , and . ICALP, volume 55 of LIPIcs, page 13:1-13:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Interactive Proofs with Polynomial-Time Quantum Prover for Computing the Order of Solvable Groups., , , and . MFCS, volume 117 of LIPIcs, page 26:1-26:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Basics and applications of measurement-based quantum computing.. ISITA, page 327-330. IEEE, (2014)Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 606-636. Springer, (2021)Depth-scaling fine-grained quantum supremacy based on SETH and qubit-scaling fine-grained quantum supremacy based on Orthogonal Vectors and 3-SUM., and . CoRR, (2019)