Author of the publication

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.

, , , and . Des. Codes Cryptogr., 7 (1-2): 101-110 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes., , , and . Des. Codes Cryptogr., 7 (1-2): 101-110 (1996)Non-embedding of non prime- power unitals with point-regular group., , and . Discret. Math., 98 (1): 23-28 (1991)Ten Years of Information Security Masters Programmes., , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 215-230. Kluwer, (2003)Primality and cryptography.. Comput. Commun., 9 (6): 318 (1986)Perfect Anonymity., and . IEEE Trans. Inf. Theory, 65 (6): 3990-3997 (2019)Stream Ciphers.. EUROCRYPT, volume 149 of Lecture Notes in Computer Science, page 181-188. Springer, (1982)Introduction to cryptology.. Inf. Secur. Tech. Rep., 2 (2): 10-13 (1997)The status of National PKIs - A European overview., , and . Inf. Secur. Tech. Rep., 15 (1): 13-20 (2010)Trusted Third Parties for Secure Electronic Commerce - Are They Needed?. ACISP, volume 1270 of Lecture Notes in Computer Science, page 1. Springer, (1997)A General Zero-Knowledge Scheme., , , and . Des. Codes Cryptogr., 12 (1): 13-37 (1997)