Threshold Computation and Cryptographic Security
From MaRDI portal
Publication:4337431
Recommendations
Cited in
(17)- SELF-SPECIFYING MACHINES
- Quantum computing, postselection, and probabilistic polynomial-time
- Lower bounds and the hardness of counting properties
- Computational complexity of the landscape. I.
- Rectangles are nonnegative juntas
- The robustness of LWPP and WPP, with an application to graph reconstruction
- The landscape of communication complexity classes
- The consequences of eliminating NP solutions
- Complexity results in graph reconstruction
- Languages polylog-time reducible to dot-depth 1/2
- Query-monotonic Turing reductions
- Error-bounded probabilistic computations between MA and AM
- Relativized worlds with an infinite hierarchy
- Commuting quantum circuits and complexity of Ising partition functions
- Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
- Computational tameness of classical non-causal models
- PP is closed under intersection
This page was built for publication: Threshold Computation and Cryptographic Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4337431)