Author of the publication

Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.

, , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 21-32. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based Key Infrastructures (IKI)., and . SEC, volume 147 of IFIP, page 167-176. Kluwer / Springer, (2004)Several Exhaustive Key Search Machines and DES., , and . EUROCRYPT, page 17-19. (1986)Pseudo-Cryptanalysis of Luffa., , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 187-198. Springer, (2010)Perfect Anonymity., and . IEEE Trans. Inf. Theory, 65 (6): 3990-3997 (2019)Chinese Lotto as an Exhaustive Code-Breaking Machine., and . Computer, 24 (11): 14-22 (1991)Cryptography: How to Attack, What to Protect?, , and . ICC (1), page 175-178. Elsevier, (1984)Dependence of Output on Input in DES: Small Avalanche Characteristics., , and . CRYPTO, volume 196 of Lecture Notes in Computer Science, page 359-376. Springer, (1984)Efficient Hardware Implementation of the DES., , and . CRYPTO, volume 196 of Lecture Notes in Computer Science, page 147-173. Springer, (1984)Threshold Cryptosystems., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 307-315. Springer, (1989)Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback., , and . INFOCOM, page 2045-2054. IEEE Computer Society, (1992)