Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PIR schemes with small download complexity and low storage requirements., , and . ISIT, page 146-150. IEEE, (2017)On the equivalence of authentication codes and robust (2, 2)-threshold schemes., and . IACR Cryptology ePrint Archive, (2019)Distinct difference configurations: multihop paths and key predistribution in sensor networks., , , and . IEEE Trans. Inf. Theory, 56 (8): 3961-3972 (2010)Efficient Key Predistribution for Grid-Based Wireless Sensor Networks., , , and . ICITS, volume 5155 of Lecture Notes in Computer Science, page 54-69. Springer, (2008)Constructions for retransmission permutation arrays., , , and . Des. Codes Cryptogr., 65 (3): 325-351 (2012)Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes., , and . Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, page 89-117. Springer, (2013)Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs., and . J. Math. Cryptol., 9 (4): 215-225 (2015)On encoding symbol degrees of array BP-XOR codes., , and . Cryptogr. Commun., 8 (1): 19-32 (2016)Two attacks on a sensor network key distribution scheme of Cheng and Agrawal., and . J. Math. Cryptol., 2 (4): 393-403 (2008)On the equivalence of authentication codes and robust (2, 2)-threshold schemes., and . J. Math. Cryptol., 15 (1): 179-196 (2021)