From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result., , и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 87-119. Springer, (1987)A fast recurrence for Fibonacci and Lucas numbers.. CoRR, (2021)A Practical Fuzzy Extractor for Continuous Features., и . ICITS, том 10015 из Lecture Notes in Computer Science, стр. 241-258. (2016)Long-Term Threats to Ballot Privacy.. IEEE Secur. Priv., 15 (3): 40-47 (2017)Dining Cryptographers are Practical (preliminary version)., и . CoRR, (2014)Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan.. IACR Cryptology ePrint Archive, (2007)Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting.. Towards Trustworthy Elections, том 6000 из Lecture Notes in Computer Science, стр. 231-241. Springer, (2010)Delphi: sharing assessments of cryptographic assumptions., и . IACR Cryptol. ePrint Arch., (2024)A Two-Party Protocol with Trusted Initializer for Computing the Inner Product., , , и . WISA, том 6513 из Lecture Notes in Computer Science, стр. 337-350. Springer, (2010)Gradual and verifiable release of a secret, , , и . Advances in Cryptology -- CRYPTO '87, том 293 из Lecture Notes in Computer Science, стр. 156--166. Springer, (1988)