Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of quantum protocols against coherent measurements.. STOC, page 67-75. ACM, (1995)Linear Decision Trees: Volume Estimates and Topological Bounds, , and . STOC, page 170-177. ACM, (1992)Concurrent Knowledge Extraction in the Public-Key Model., , and . ICALP (1), volume 6198 of Lecture Notes in Computer Science, page 702-714. Springer, (2010)Quantum Computing: A Great Science in the Making.. TAMC, volume 7287 of Lecture Notes in Computer Science, page 28. Springer, (2012)Communication Complexity and Its Applications.. FAW, volume 5598 of Lecture Notes in Computer Science, page 2. Springer, (2009)Separating the Polynomial-Time Hierarchy by Oracles (Preliminary Version). FOCS, page 1-10. IEEE Computer Society, (1985)Near-Optimal Time-Space Tradeoff for Element Distinctness. FOCS, page 91-97. IEEE Computer Society, (1988)Graph Design for Secure Multiparty Computation over Non-Abelian Groups., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 37-53. Springer, (2008)An n-to-1 Bidder Reduction for Multi-item Auctions and its Applications.. SODA, page 92-109. SIAM, (2015)Bounds on Selection Networks. SWAT, page 110-116. IEEE Computer Society, (1974)