From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Linear, Constant-Rounds Bit-Decomposition., и . ICISC, том 5984 из Lecture Notes in Computer Science, стр. 245-257. Springer, (2009)Solving Linear Programs Using Multiparty Computation.. Financial Cryptography, том 5628 из Lecture Notes in Computer Science, стр. 90-107. Springer, (2009)Fast Multiparty Multiplications from shared bits., , и . IACR Cryptology ePrint Archive, (2016)Computationally Secure Pattern Matching in the Presence of Malicious Adversaries., и . ASIACRYPT, том 6477 из Lecture Notes in Computer Science, стр. 195-212. Springer, (2010)Secret Sharing Comparison by Transformation and Rotation., и . ICITS, том 4883 из Lecture Notes in Computer Science, стр. 169-180. Springer, (2007)Secure Multiparty Computation Goes Live., , , , , , , , , и 2 other автор(ы). Financial Cryptography, том 5628 из Lecture Notes in Computer Science, стр. 325-343. Springer, (2009)Secure Computation, I/O-Efficient Algorithms and Distributed Signatures., , и . CT-RSA, том 7178 из Lecture Notes in Computer Science, стр. 278-295. Springer, (2012)Secure Equality and Greater-Than Tests with Sublinear Online Complexity., и . ICALP (2), том 7966 из Lecture Notes in Computer Science, стр. 645-656. Springer, (2013)A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation.. ICISC, том 8565 из Lecture Notes in Computer Science, стр. 20-33. Springer, (2013)Secure Relative Performance Scheme., и . WINE, том 4858 из Lecture Notes in Computer Science, стр. 396-403. Springer, (2007)