From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Handling Correlated Errors: Hardness of LWE in the Exponent., , и . IACR Cryptol. ePrint Arch., (2018)Robust keys from physical unclonable functions., , , и . HOST, стр. 88-92. IEEE Computer Society, (2014)When Are Fuzzy Extractors Possible?, , и . IEEE Trans. Inf. Theory, 66 (8): 5282-5298 (2020)When are Continuous-Source Fuzzy Extractors Possible?, и . IACR Cryptol. ePrint Arch., (2018)Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy., и . ICITS, том 9063 из Lecture Notes in Computer Science, стр. 69-86. Springer, (2015)DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks., , , и . ACISP, том 11547 из Lecture Notes in Computer Science, стр. 456-474. Springer, (2019)Private Eyes: Zero-Leakage Iris Searchable Encryption., , , , и . IACR Cryptol. ePrint Arch., (2023)Code Offset in the Exponent., , и . ITC, том 199 из LIPIcs, стр. 15:1-15:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Non-malleable Digital Lockers., и . IACR Cryptol. ePrint Arch., (2018)Catching MPC Cheaters: Identification and Openability., , и . IACR Cryptol. ePrint Arch., (2016)