Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Time Programs., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 39-56. Springer, (2008)Property Testing and its Connection to Learning and Approximation, , and . J. ACM, 45 (4): 653-750 (1998)Efficient Interactive Proofs and Applications to Approximation.. ISTCS, page 1-2. IEEE Computer Society, (1993)Probabilistic encryption & how to play mental poker keeping secret all partial information., and . Providing Sound Foundations for Cryptography, ACM, (2019)The knowledge complexity of interactive proof-systems., , and . Providing Sound Foundations for Cryptography, ACM, (2019)Bipartite Perfect Matching in Pseudo-Deterministic NC., and . ICALP, volume 80 of LIPIcs, page 87:1-87:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Formalizing Data Deletion in the Context of the Right to Be Forgotten., , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 373-402. Springer, (2020)Languages that Are Easier than their Proofs, , , and . FOCS, page 19-28. IEEE Computer Society, (1991)Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults (Extended Abstract), , , and . FOCS, page 383-395. IEEE Computer Society, (1985)On the Power of Interaction, , and . FOCS, page 368-379. IEEE Computer Society, (1986)