Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Goldreich, Oded
add a person with the name Goldreich, Oded
 

Other publications of authors with the same name

Preface.. J. Cryptology, 17 (1): 1-3 (2004)Electronic Wallet., and . CRYPTO, page 383-386. Plenum Press, New York, (1983)Computational Sample Complexity., , and . SIAM J. Comput., 29 (3): 854-879 (1999)Simple Constructions of Almost k-Wise Independent Random Variables, , , and . FOCS, page 544-553. IEEE Computer Society, (1990)0-8186-2082-X.Interactive Proof Systems: Provers that never Fail and Random Selection (Extended Abstract), , and . FOCS, page 449-461. IEEE Computer Society, (1987)Security Preserving Amplification of Hardness, , , , and . FOCS, page 318-326. IEEE Computer Society, (1990)Learning Polynomials with Queries: The Highly Noisy Case., , and . FOCS, page 294-303. IEEE Computer Society, (1995)A Fair Protocol for Signing Contracts (Extended Abstract)., , , and . ICALP, volume 194 of Lecture Notes in Computer Science, page 43-52. Springer, (1985)Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs - (Extended Abstract)., , and . ICALP (1), volume 9134 of Lecture Notes in Computer Science, page 666-677. Springer, (2015)Concurrent Zero-Knowledge with Timing, Revisited.. Essays in Memory of Shimon Even, volume 3895 of Lecture Notes in Computer Science, page 27-87. Springer, (2006)