From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Power of Hierarchical Identity-Based Encryption., и . EUROCRYPT (2), том 9666 из Lecture Notes in Computer Science, стр. 243-272. Springer, (2016)Transversals in long rectangular arrays., , , , и . Discret. Math., 306 (23): 3011-3013 (2006)Registration-Based Encryption from Standard Assumptions., , , , и . IACR Cryptol. ePrint Arch., (2018)Multi-party Poisoning through Generalized p-Tampering., , и . CoRR, (2018)Computational Concentration of Measure: Optimal Bounds, Reductions, and More., , и . SODA, стр. 345-363. SIAM, (2020)Black-Box Uselessness: Composing Separations in Cryptography., , и . ITCS, том 185 из LIPIcs, стр. 47:1-47:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Is Private Learning Possible with Instance Encoding?, , , , , , , и . SP, стр. 410-427. IEEE, (2021)Learning and certification under instance-targeted poisoning., , и . UAI, том 161 из Proceedings of Machine Learning Research, стр. 2135-2145. AUAI Press, (2021)Optimizing Trees for Static Searchable Encryption., , и . IACR Cryptology ePrint Archive, (2018)Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners., и . TCC (2), том 10678 из Lecture Notes in Computer Science, стр. 245-279. Springer, (2017)