Author of the publication

08491 Executive Summary - Theoretical Foundations of Practical Information Security.

, , , and . Theoretical Foundations of Practical Information Security, volume 08491 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying unpredictable test examples with worst-case guarantees., , , and . ITA, page 1-14. IEEE, (2020)On Best-Possible Obfuscation., and . J. Cryptol., 27 (3): 480-505 (2014)Fine-grained Complexity Meets IP = PSPACE., , , , and . SODA, page 1-20. SIAM, (2019)One-Time Programs., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 39-56. Springer, (2008)Property Testing and its Connection to Learning and Approximation, , and . J. ACM, 45 (4): 653-750 (1998)Bipartite Perfect Matching in Pseudo-Deterministic NC., and . ICALP, volume 80 of LIPIcs, page 87:1-87:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Probabilistic encryption & how to play mental poker keeping secret all partial information., and . Providing Sound Foundations for Cryptography, ACM, (2019)The knowledge complexity of interactive proof-systems., , and . Providing Sound Foundations for Cryptography, ACM, (2019)Randomness in Interactive Proofs., , and . Comput. Complex., (1993)Formalizing Data Deletion in the Context of the Right to Be Forgotten., , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 373-402. Springer, (2020)