Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc32.bht:"
@article{DBLP:journals/joc/AbdallaBP19, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {84--150}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9283-2}, doi = {10.1007/S00145-018-9283-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbeCDD19, author = {Masayuki Abe and Jan Camenisch and Rafael Dowsley and Maria Dubovitskaya}, title = {On the Impossibility of Structure-Preserving Deterministic Primitives}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {239--264}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9292-1}, doi = {10.1007/S00145-018-9292-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbeCDD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbeGKOT19, author = {Masayuki Abe and Jens Groth and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi}, title = {Efficient Fully Structure-Preserving Signatures and Shrinking Commitments}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {973--1025}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9300-5}, doi = {10.1007/S00145-018-9300-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbeGKOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaiGLS19, author = {Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield}, title = {Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {35--83}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9304-1}, doi = {10.1007/S00145-018-9304-1}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaiGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarbulescuD19, author = {Razvan Barbulescu and Sylvain Duquesne}, title = {Updating Key Size Estimations for Pairings}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1298--1336}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9280-5}, doi = {10.1007/S00145-018-9280-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarbulescuD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BartheFFMSS19, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John C. Mitchell and Andre Scedrov and Benedikt Schmidt}, title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {324--360}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9302-3}, doi = {10.1007/S00145-018-9302-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BartheFFMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BermanHKN19, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness-Preserving Reductions via Cuckoo Hashing}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {361--392}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9293-0}, doi = {10.1007/S00145-018-9293-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BermanHKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BernardHFN19, author = {Florent Bernard and Patrick Haddad and Viktor Fischer and Jean Nicolai}, title = {From Physical to Stochastic Modeling of a TERO-Based {TRNG}}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {435--458}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9291-2}, doi = {10.1007/S00145-018-9291-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BernardHFN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BockBBHMMGTT19, author = {Estuardo Alpirez Bock and Joppe W. Bos and Chris Brzuska and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen and Alexander Treff}, title = {White-Box Cryptography: Don't Forget About Grey-Box Attacks}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1095--1143}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09315-1}, doi = {10.1007/S00145-019-09315-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BockBBHMMGTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BrassardHKKLS19, author = {Gilles Brassard and Peter H{\o}yer and Kassem Kalach and Marc Kaplan and Sophie Laplante and Louis Salvail}, title = {Key Establishment {\`{a}} la Merkle in a Quantum World}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {601--634}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09317-z}, doi = {10.1007/S00145-019-09317-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BrassardHKKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Chaigneau0GJR19, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of {NORX} v2.0}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1423--1447}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9297-9}, doi = {10.1007/S00145-018-9297-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CheonHLRS19, author = {Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl{\'{e}}}, title = {Cryptanalysis of the {CLT13} Multilinear Map}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {547--565}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9307-y}, doi = {10.1007/S00145-018-9307-Y}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/CheonHLRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChoiKSYZ19, author = {Seung Geol Choi and Jonathan Katz and Dominique Schr{\"{o}}der and Arkady Yerukhimovich and Hong{-}Sheng Zhou}, title = {(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {459--497}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9288-x}, doi = {10.1007/S00145-018-9288-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChoiKSYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CohenCGZ19, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {690--741}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9279-y}, doi = {10.1007/S00145-018-9279-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CohenCGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledGL19, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, title = {Leakage Resilience from Program Obfuscation}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {742--824}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9286-z}, doi = {10.1007/S00145-018-9286-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledLP19, author = {Dana Dachman{-}Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin}, title = {Oblivious Network {RAM} and Leveraging Parallelism to Achieve Obliviousness}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {941--972}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9301-4}, doi = {10.1007/S00145-018-9301-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DinurDKS19, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1448--1490}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9303-2}, doi = {10.1007/S00145-018-9303-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DinurDKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DucDF19, author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust}, title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {151--177}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9284-1}, doi = {10.1007/S00145-018-9284-1}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DucDF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DucFS19, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1263--1297}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9277-0}, doi = {10.1007/S00145-018-9277-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DucFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FleischhackerJS19, author = {Nils Fleischhacker and Tibor Jager and Dominique Schr{\"{o}}der}, title = {On Tight Security Proofs for Schnorr Signatures}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {566--599}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09311-5}, doi = {10.1007/S00145-019-09311-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FleischhackerJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FuchsbauerHS19, author = {Georg Fuchsbauer and Christian Hanser and Daniel Slamanig}, title = {Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {498--546}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9281-4}, doi = {10.1007/S00145-018-9281-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FuchsbauerHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayMRTN19, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft and Angelo Agatino Nicolosi}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {265--323}, year = {2019}, url = {https://doi.org/10.1007/s00145-017-9275-7}, doi = {10.1007/S00145-017-9275-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayMRTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayV19, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On Black-Box Complexity of Universally Composable Security in the {CRS} Model}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {635--689}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09326-y}, doi = {10.1007/S00145-019-09326-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayV19a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {What Security Can We Achieve Within 4 Rounds?}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1200--1262}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09323-1}, doi = {10.1007/S00145-019-09323-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayV19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayY19, author = {Carmit Hazay and Avishay Yanai}, title = {Constant-Round Maliciously Secure Two-Party Computation in the {RAM} Model}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1144--1199}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09321-3}, doi = {10.1007/S00145-019-09321-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HermelinCN19, author = {Miia Hermelin and Joo Yeon Cho and Kaisa Nyberg}, title = {Multidimensional Linear Cryptanalysis}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {1--34}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9308-x}, doi = {10.1007/S00145-018-9308-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HermelinCN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JovanovicLMSY19, author = {Philipp Jovanovic and Atul Luykx and Bart Mennink and Yu Sasaki and Kan Yasuda}, title = {Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {895--940}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9299-7}, doi = {10.1007/S00145-018-9299-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JovanovicLMSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Kiyoshima19, author = {Susumu Kiyoshima}, title = {Round-Efficient Black-Box Construction of Composable Multi-Party Computation}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {178--238}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9276-1}, doi = {10.1007/S00145-018-9276-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Kiyoshima19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Kiyoshima19a, author = {Susumu Kiyoshima}, title = {Non-black-box Simulation in the Fully Concurrent Setting, Revisited}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {393--434}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-09309-5}, doi = {10.1007/S00145-018-09309-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Kiyoshima19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LacerdaRR19, author = {Felipe Gomes Lacerda and Joseph M. Renes and Renato Renner}, title = {Classical Leakage Resilience from Fault-Tolerant Quantum Computation}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1071--1094}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09310-6}, doi = {10.1007/S00145-019-09310-6}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LacerdaRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellPSY19, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant-Round Multi-party Computation Combining {BMR} and {SPDZ}}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {1026--1069}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09322-2}, doi = {10.1007/S00145-019-09322-2}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LindellPSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/OkamotoT19, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1491--1573}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9305-0}, doi = {10.1007/S00145-018-9305-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/OkamotoT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/OliveiraLCR19, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Daniel Cervantes{-}V{\'{a}}zquez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Koblitz Curves over Quadratic Fields}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {867--894}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9294-z}, doi = {10.1007/S00145-018-9294-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/OliveiraLCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Takayasu0P19, author = {Atsushi Takayasu and Yao Lu and Liqiang Peng}, title = {Small CRT-Exponent {RSA} Revisited}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1337--1382}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9282-3}, doi = {10.1007/S00145-018-9282-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Takayasu0P19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/TodoLS19, author = {Yosuke Todo and Gregor Leander and Yu Sasaki}, title = {Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1383--1422}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9285-0}, doi = {10.1007/S00145-018-9285-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/TodoLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Zhandry19, author = {Mark Zhandry}, title = {The Magic of ELFs}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {825--866}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9289-9}, doi = {10.1007/S00145-018-9289-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Zhandry19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.