From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

End-to-End Secure Messaging with Traceability Only for Illegal Content., , , и . EUROCRYPT (5), том 14008 из Lecture Notes in Computer Science, стр. 35-66. Springer, (2023)Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)., , и . CRYPTO (5), том 14085 из Lecture Notes in Computer Science, стр. 224-257. Springer, (2023)One-Way Functions Imply Secure Computation in a Quantum World., , , и . CRYPTO (1), том 12825 из Lecture Notes in Computer Science, стр. 467-496. Springer, (2021)Cryptography with Certified Deletion., и . IACR Cryptol. ePrint Arch., (2022)One-Way Functions Imply Secure Computation in a Quantum World., , , и . CoRR, (2020)A New Framework for Quantum Oblivious Transfer., , , и . IACR Cryptol. ePrint Arch., (2022)Two-Round Maliciously Secure Computation with Super-Polynomial Simulation., , , , и . TCC (1), том 13042 из Lecture Notes in Computer Science, стр. 654-685. Springer, (2021)Secure Quantum Computation with Classical Communication.. TCC (1), том 13042 из Lecture Notes in Computer Science, стр. 1-30. Springer, (2021)On the Round Complexity of Secure Quantum Computation., , , и . CRYPTO (1), том 12825 из Lecture Notes in Computer Science, стр. 406-435. Springer, (2021)On the Communication Complexity of Secure Multi-Party Computation With Aborts., , , , и . CoRR, (2024)