Author of the publication

Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field.

, , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 466-486. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounds on the Threshold Gap in Secret Sharing and its Applications., , and . IEEE Trans. Inf. Theory, 59 (9): 5600-5612 (2013)Asymptotic Bound for Multiplication Complexity in the Extensions of Small Finite Fields., , , and . IEEE Trans. Inf. Theory, 58 (7): 4930-4935 (2012)On secret sharing with nonlinear product reconstruction., , , , and . IACR Cryptology ePrint Archive, (2013)Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves., , , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 451-470. Springer, (2008)Bounds on the Threshold Gap in Secret Sharing over Small Fields., , and . IACR Cryptology ePrint Archive, (2012)The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing., , and . CRYPTO, volume 6841 of Lecture Notes in Computer Science, page 685-705. Springer, (2011)Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field., , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 466-486. Springer, (2009)Torsion Limits and Riemann-Roch Systems for Function Fields and Applications, , and . CoRR, (2012)The Arithmetic Codex., , and . IACR Cryptology ePrint Archive, (2012)