From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Oblivious transfers and intersecting codes., , и . IEEE Trans. Inf. Theory, 42 (6): 1769-1780 (1996)Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract)., , и . EUROCRYPT, том 434 из Lecture Notes in Computer Science, стр. 192-195. Springer, (1989)Practical Quantum Oblivious Transfer., , , и . CRYPTO, том 576 из Lecture Notes in Computer Science, стр. 351-366. Springer, (1991)Weakening Security Assumptions and Oblivious Transfer (Abstract)., и . CRYPTO, том 403 из Lecture Notes in Computer Science, стр. 2-7. Springer, (1988)25 years of quantum cryptography., и . SIGACT News, 27 (3): 13-24 (1996)Computational Collapse of Quantum State with Application to Oblivious Transfer., , , и . TCC, том 2951 из Lecture Notes in Computer Science, стр. 374-393. Springer, (2004)Zero-Knowledge Simulation of Boolean Circuits., и . CRYPTO, том 263 из Lecture Notes in Computer Science, стр. 223-233. Springer, (1986)Committed Oblivious Transfer and Private Multi-Party Computation., , и . CRYPTO, том 963 из Lecture Notes in Computer Science, стр. 110-123. Springer, (1995)Quantum Cryptography., и . Encyclopedia of Cryptography and Security, Springer, (2005)Cut-and-choose protocol.. Encyclopedia of Cryptography and Security, Springer, (2005)