No. | Title | Author | Year |
---|---|---|---|
1 | New Algorithms and Applications for Risk-Limiting Audits | Karov, Bar et al. | 2023 |
2 | Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes | Ben Dov, Yoav et al. | 2023 |
3 | Keep That Card in Mind: Card Guessing with Limited Memory | Menuhin, Boaz et al. | 2022 |
4 | Mirror Games Against an Open Book Player | Magen, Roey et al. | 2022 |
5 | Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users | Naor, Moni et al. | 2020 |
6 | Instance Complexity and Unlabeled Certificates in the Decision Tree Model | Grossman, Tomer et al. | 2020 |
7 | Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery | Naor, Moni et al. | 2020 |
8 | The Journey from NP to TFNP Hardness | Hubácek, Pavel et al. | 2017 |
Current Page : | |
Number of result pages: | 1 |
Number of documents: | 8 |