Author of the publication

Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority.

, , and . IACR Cryptology ePrint Archive, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards lower bounds on locally testable codes via density arguments., and . Computational Complexity, 21 (2): 267-309 (2012)Affine Dispersers from Subspace Polynomials., and . SIAM J. Comput., 41 (4): 880-914 (2012)Some 3CNF Properties Are Hard to Test., , and . SIAM J. Comput., 35 (1): 1-21 (2005)Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding., , , , and . SIAM J. Comput., 36 (4): 889-974 (2006)The Complexity of User Retention., and . ITCS, volume 124 of LIPIcs, page 12:1-12:30. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2019)Lower bounds for bounded depth Frege proofs via Pudlák-Buss games., and . ACM Trans. Comput. Log., 11 (3): 19:1-19:17 (2010)Improved concrete efficiency and security analysis of Reed-Solomon PCPPs., , , and . Electronic Colloquium on Computational Complexity (ECCC), (2016)Breaking local symmetries can dramatically reduce the length of propositional refutations., , and . Electronic Colloquium on Computational Complexity (ECCC), (2010)3CNF Properties are Hard to Test, , and . Electronic Colloquium on Computational Complexity (ECCC), (2003)A security analysis of Probabilistically Checkable Proofs., , , and . Electronic Colloquium on Computational Complexity (ECCC), (2016)