From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation., , , и . J. Cryptol., 37 (1): 1 (марта 2024)Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation., , , и . IACR Cryptol. ePrint Arch., (2022)Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i풪., , , и . IACR Cryptol. ePrint Arch., (2022)Hard Languages in NP ∩ coNP and NIZK Proofs from Unstructured Hardness., , , , , и . STOC, стр. 1243-1256. ACM, (2023)Witness Semantic Security., , и . EUROCRYPT (5), том 14655 из Lecture Notes in Computer Science, стр. 155-184. Springer, (2024)A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers., , , и . IACR Cryptol. ePrint Arch., (2021)Post-quantum RSA., , , и . PQCrypto, том 10346 из Lecture Notes in Computer Science, стр. 311-329. Springer, (2017)Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪., , , и . EUROCRYPT (1), том 14004 из Lecture Notes in Computer Science, стр. 205-235. Springer, (2023)Hard Languages in $NP coNP$ and NIZK Proofs from Unstructured Hardness., , , , , и . IACR Cryptol. ePrint Arch., (2023)Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation., , , и . CRYPTO (2), том 13508 из Lecture Notes in Computer Science, стр. 573-602. Springer, (2022)