Author of the publication

On the Parallel Repetition of Multi-Player Games: The No-Signaling Case.

, , and . TQC, volume 27 of LIPIcs, page 24-35. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure identification and QKD in the bounded-quantum-storage model., , , and . Theor. Comput. Sci., (2014)Position-Based Quantum Cryptography., , and . ERCIM News, 2011 (85): 16-17 (2011)From Classical to Quantum Information - Or: When You Have Less Than No Uncertainty.. ERCIM News, (2018)Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority., , and . IACR Cryptology ePrint Archive, (2011)Quantum Authentication and Encryption with Key Recycling., and . IACR Cryptology ePrint Archive, (2017)Position-Based Quantum Cryptography: Impossibility and Constructions., , , , , , and . CRYPTO, volume 6841 of Lecture Notes in Computer Science, page 429-446. Springer, (2011)The garden-hose model., , , and . ITCS, page 145-158. ACM, (2013)On the Parallel Repetition of Multi-Player Games: The No-Signaling Case., , and . TQC, volume 27 of LIPIcs, page 24-35. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2014)Unfair Noisy Channels and Oblivious Transfer., , , and . TCC, volume 2951 of Lecture Notes in Computer Science, page 355-373. Springer, (2004)Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments., , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 206-223. Springer, (2002)