Search for persons
X
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Scalable and Transparent Proofs over All Large Fields, via ..:
, In:
?
2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) ,
4
Proximity Gaps for Reed–Solomon Codes:
, In:
?
Proceedings of the 35th Computational Complexity Conference ,
5
Geometric rank of tensors and subrank of matrix multiplicat..:
, In:
?
2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS) ,
7
Quasilinear Time List-Decodable Codes for Space Bounded Cha..:
, In:
?
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms ,
8
Near-optimal approximation algorithm for simultaneous Max-C..:
, In:
?
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms ,
9
Syndrome decoding of Reed-Muller codes and tensor decomposi..:
, In:
?
Proceedings of the 33rd Computational Complexity Conference ,
11
Worst-case to average case reductions for the distance to a..:
, In:
?
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms ,
12
Syndrome decoding of reed-muller codes and tensor decomposi..:
, In:
?
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms ,
13
Near-optimal approximation algorithm for simultaneous Max-C..:
, In:
?
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms ,
14