Author of the publication

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.

, , , and . Des. Codes Cryptogr., 7 (1-2): 101-110 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributing the Encryption and Decryption of a Block Cipher., , , and . Des. Codes Cryptogr., 36 (3): 263-287 (2005)Establishing the broadcast efficiency of the Subset Difference Revocation Scheme., , and . Des. Codes Cryptogr., 51 (3): 315-334 (2009)Constructing Orientable Sequences., and . IEEE Trans. Inf. Theory, 68 (7): 4782-4789 (2022)Perfect binary arrays and difference sets., , , and . Discret. Math., 125 (1-3): 241-254 (1994)A characterisation of Fq-conics of PG(2,q3)., , and . Discret. Math., 346 (4): 113282 (April 2023)Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes., , , and . Des. Codes Cryptogr., 7 (1-2): 101-110 (1996)Non-embedding of non prime- power unitals with point-regular group., , and . Discret. Math., 98 (1): 23-28 (1991)Difference basis systems.. Discret. Math., 63 (1): 81-90 (1987)Towards an optimal swap gate., and . Quantum Inf. Process., 13 (6): 1467-1482 (2014)The Combinatorics of Perfect Authentication Schemes., , and . SIAM J. Discret. Math., 7 (1): 102-107 (1994)