From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifiable Partial Key Escrow., и . IACR Cryptology ePrint Archive, (1996)How to Incentivize Data-Driven Collaboration Among Competing Parties., , и . IACR Cryptology ePrint Archive, (2015)A Note on the Impossibility of Obfuscation with Auxiliary Input., и . IACR Cryptology ePrint Archive, (2013)On the power of interaction., , и . Combinatorica, 10 (1): 3-25 (1990)Primality Testing Using Elliptic Curves., и . J. ACM, 46 (4): 450-472 (1999)A (de)constructive approach to program checking., , , , и . STOC, стр. 143-152. ACM, (2008)On the Limits of Non-Approximability of Lattice Problems., и . STOC, стр. 1-9. ACM, (1998)Bounded-Collusion IBE from Key Homomorphism., , и . TCC, том 7194 из Lecture Notes in Computer Science, стр. 564-581. Springer, (2012)Secure Computation without Agreement., и . DISC, том 2508 из Lecture Notes in Computer Science, стр. 17-32. Springer, (2002)Program Obfuscation and One-Time Programs.. CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 333-334. Springer, (2008)