We construct a classically verifiable succinct interactive argument for
...
Is it possible to convert classical cryptographic reductions into
post-q...
An error correcting code (𝖤𝖢𝖢) allows a sender to send a message
to a re...
We present a transductive learning algorithm that takes as input trainin...