Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Multiplicative Linear Secret Sharing Schemes., , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 135-147. Springer, (2003)Cryptographic Fault Diagnosis using VerFI., , , and . IACR Cryptology ePrint Archive, (2019)Applying General Access Structure to Proactive Secret Sharing Schemes., , , and . IACR Cryptology ePrint Archive, (2002)Error-Set Codes and Related Objects., , and . COCOON, volume 3595 of Lecture Notes in Computer Science, page 577-585. Springer, (2005)Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 1-15. Springer, (2003)On a Resynchronization Weakness in a Class of Combiners with Memory., , , and . SCN, volume 2576 of Lecture Notes in Computer Science, page 164-173. Springer, (2002)On the Size of Monotone Span Programs., , and . SCN, volume 3352 of Lecture Notes in Computer Science, page 249-262. Springer, (2004)On the Non-Minimal codewords of weight 2dmin in the binary Reed-Muller Code., , and . Electron. Notes Discret. Math., (2001)Exploring the storj network: a security analysis., , , , and . SAC, page 257-264. ACM, (2021)Classification of cubic (n-4)-resilient Boolean functions., , , and . IEEE Trans. Inf. Theory, 52 (4): 1670-1676 (2006)