Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Derandomization in Cryptography., , and . SIAM J. Comput., 37 (2): 380-400 (2007)Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function., , , , and . SIAM J. Comput., 39 (3): 1153-1218 (2009)Efficiency Improvements in Constructing Pseudorandom Generators from One-Way Functions., , and . SIAM J. Comput., 42 (3): 1405-1430 (2013)An Unconditional Study of Computational Zero Knowledge.. FOCS, page 176-185. IEEE Computer Society, (2004)Special Issue On Worst-case Versus Average-case Complexity Editors' Foreword., and . Computational Complexity, 16 (4): 325-330 (2007)Entropy Waves, the Zig-Zag Graph Product, and New Constant-Degree Expanders and Extractors, , and . Electronic Colloquium on Computational Complexity (ECCC), (2001)On Approximating the Entropy of Polynomial Mappings., , , and . Electronic Colloquium on Computational Complexity (ECCC), (2010)On the complexity of computational problems regarding distributions (a survey)., and . Electronic Colloquium on Computational Complexity (ECCC), (2011)Pseudorandom Generators without the XOR Lemma., , and . J. Comput. Syst. Sci., 62 (2): 236-266 (2001)Usable Differential Privacy: A Case Study with PSI., , , and . CoRR, (2018)