Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharp Quantum versus Classical Query Complexity Separations., , and . Algorithmica, 34 (4): 449-461 (2002)Size-Depth Tradeoffs for Algebraic Formulas., , and . SIAM J. Comput., 24 (4): 682-705 (1995)Controlled gradual disclosure schemes for random bits and their applications. Advances in Cryptology -- CRYPTO~'89, volume 435 of Lecture Notes in Computer Science, page 573--588. Springer, (1990)Towards Optimal Simulations of Formulas by Bounded-Width Programs.. Comput. Complex., (1991)Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S.. CRYPTO, volume 537 of Lecture Notes in Computer Science, page 530-544. Springer, (1990)Reconstructing Strings from Substrings with Quantum Queries., , , , , , and . SWAT, volume 7357 of Lecture Notes in Computer Science, page 388-397. Springer, (2012)Methodologies for designing block ciphers and cryptographic protocols.. University of Toronto, Canada, (1989)Efficient discrete-time simulations of continuous-time quantum query algorithms., , , , and . STOC, page 409-416. ACM, (2009)Oracles and Queries that are Sufficient for Exact Learning (Extended Abstract)., , , and . COLT, page 130-139. ACM, (1994)Towards Optimal Simulations of Formulas by Bounded-Width Programs. STOC, page 271-277. ACM, (1990)