Author of the publication

On Algebraic Immunity and Annihilators.

, , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 65-80. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-regular sets of matrices and applications.. Australas. J Comb., (1993)Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices., and . Australas. J Comb., (1991)Permutation Generators of Alternating Groups., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 237-244. Springer, (1990)Ideal Secret Sharing Schemes from Permutations., and . Int. J. Netw. Secur., 2 (3): 238-244 (2006)On Cheating Immune Secret Sharing., and . Discret. Math. Theor. Comput. Sci., 6 (2): 253-264 (2004)Restriction, Terms and Nonlinearity of Boolean Functions., , and . Theor. Comput. Sci., 226 (1-2): 207-223 (1999)Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract)., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 119-132. Springer, (1994)Constructions of Cheating Immune Secret Sharing., and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 226-243. Springer, (2001)Cheating Prevention in Secret Sharing over GF(pt)., and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 79-90. Springer, (2001)GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions., and . J. Univers. Comput. Sci., 1 (5): 320-337 (1995)