From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Monotone Function Closure of Statistical Zero-Knowledge., и . IACR Cryptology ePrint Archive, (1996)Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes., и . IACR Cryptology ePrint Archive, (2000)DDH-like Assumptions Based on Extension Rings., , , , и . IACR Cryptology ePrint Archive, (2011)Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor., и . IACR Cryptology ePrint Archive, (2001)Commitment Schemes and Zero-Knowledge Protocols.. Lectures on Data Security, том 1561 из Lecture Notes in Computer Science, стр. 63-86. Springer, (1998)Access Control Encryption: Enforcing Information Flow with Cryptography., , и . TCC (B2), том 9986 из Lecture Notes in Computer Science, стр. 547-576. (2016)Efficient and Provable Security Amplifications., , и . Security Protocols Workshop, том 1189 из Lecture Notes in Computer Science, стр. 101-109. Springer, (1996)Multiparty Unconditionally Secure Protocols (Abstract)., , и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 462. Springer, (1987)Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption., и . CRYPTO, том 2729 из Lecture Notes in Computer Science, стр. 247-264. Springer, (2003)On the Amortized Complexity of Zero-Knowledge Protocols., и . CRYPTO, том 5677 из Lecture Notes in Computer Science, стр. 177-191. Springer, (2009)