| No. | Title | Author | Year |
|---|---|---|---|
| 1 | New Algorithms and Applications for Risk-Limiting Audits | Karov, Bar et al. | 2023 |
| 2 | Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes | Ben Dov, Yoav et al. | 2023 |
| 3 | Keep That Card in Mind: Card Guessing with Limited Memory | Menuhin, Boaz et al. | 2022 |
| 4 | Mirror Games Against an Open Book Player | Magen, Roey et al. | 2022 |
| 5 | Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users | Naor, Moni et al. | 2020 |
| 6 | Instance Complexity and Unlabeled Certificates in the Decision Tree Model | Grossman, Tomer et al. | 2020 |
| 7 | Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery | Naor, Moni et al. | 2020 |
| 8 | The Journey from NP to TFNP Hardness | Hubácek, Pavel et al. | 2017 |
| Current Page : | |
| Number of result pages: | 1 |
| Number of documents: | 8 |