ParentsSign in to add mentor
ChildrenSign in to add trainee
CollaboratorsSign in to add collaborator
BETA: Related publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.
|Juma A, Vahlis Y. (2010) Protecting cryptographic keys against continual leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 41-58|
|Juma A, Kabanets V, Rackoff C, et al. (2009) The black-box query complexity of polynomial summation Computational Complexity. 18: 59-79|