From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Asymmetric All-or-nothing Transforms., и . IACR Cryptol. ePrint Arch., (2021)Generalizations of All-or-Nothing Transforms and their Application in Secure Distributed Storage.. University of Waterloo, Ontario, Canada, (2021)base-search.net (ftunivwaterloo:oai:uwspace.uwaterloo.ca:10012/16739).Proximity User Identification Using Correlogram., , , и . Intelligent Information Processing, том 340 из IFIP Advances in Information and Communication Technology, стр. 343-351. Springer, (2010)Constructions and bounds for codes with restricted overlaps., , , и . CoRR, (2022)Constructions and Bounds for Codes With Restricted Overlaps., , , и . IEEE Trans. Inf. Theory, 70 (4): 2479-2490 (апреля 2024)On the Information-theoretic Security of Combinatorial All-or-nothing Transforms., , , , и . CoRR, (2022)Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets., , и . IACR Cryptology ePrint Archive, (2017)Computational results on invertible matrices with the maximum number of invertible 2×2 submatrices., и . Australas. J Comb., (2017)On Security Properties of All-or-nothing Transforms., и . IACR Cryptol. ePrint Arch., (2021)On the Security Properties of Combinatorial All-or-nothing Transforms., , , , и . ISIT, стр. 1447-1452. IEEE, (2022)