From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification., , и . Electron. Colloquium Comput. Complex., (2011)More Constructions of Lossy and Correlation-Secure Trapdoor Functions., , , , и . J. Cryptol., 26 (1): 39-74 (2013)Approximate k-Steiner Forests via the Lagrangian Relaxation Technique with Internal Preprocessing., и . Algorithmica, 56 (4): 529-549 (2010)David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware., и . EUROCRYPT, том 4965 из Lecture Notes in Computer Science, стр. 527-544. Springer, (2008)Strengthening the Security of Encrypted Databases: Non-transitive JOINs., , и . TCC (2), том 10678 из Lecture Notes in Computer Science, стр. 631-661. Springer, (2017)Function-Private Functional Encryption in the Private-Key Setting., и . TCC (2), том 9015 из Lecture Notes in Computer Science, стр. 306-324. Springer, (2015)Technical Perspective: Finding Connections between One-Way Functions and Kolmogorov Complexity.. Commun. ACM, 66 (5): 90 (мая 2023)Accumulators in (and Beyond) Generic Groups: Non-trivial Batch Verification Requires Interaction., и . TCC (2), том 12551 из Lecture Notes in Computer Science, стр. 77-107. Springer, (2020)Multidisciplinary Research in e-Health: Challenges and Thoughts., , , и . ICT4AWE, стр. 250-255. SCITEPRESS, (2020)Balls and Bins: Smaller Hash Families and Faster Evaluation., , , и . FOCS, стр. 599-608. IEEE Computer Society, (2011)