Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions., , , and . IEEE Trans. Inf. Theory, 51 (3): 1182-1189 (2005)Classification of cubic (n-4)-resilient Boolean functions., , , and . IEEE Trans. Inf. Theory, 52 (4): 1670-1676 (2006)Cryptographic Fault Diagnosis using VerFI., , , and . IACR Cryptology ePrint Archive, (2019)On the Non-Minimal codewords of weight 2dmin in the binary Reed-Muller Code., , and . Electron. Notes Discret. Math., (2001)First-Order Hardware Sharings of the AES., , and . IACR Cryptol. ePrint Arch., (2021)SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice., , and . IACR Cryptol. ePrint Arch., (2024)Applying General Access Structure to Proactive Secret Sharing Schemes., , , and . IACR Cryptology ePrint Archive, (2002)On a Resynchronization Weakness in a Class of Combiners with Memory., , , and . SCN, volume 2576 of Lecture Notes in Computer Science, page 164-173. Springer, (2002)On the Size of Monotone Span Programs., , and . SCN, volume 3352 of Lecture Notes in Computer Science, page 249-262. Springer, (2004)Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 1-15. Springer, (2003)