Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smallest Possible Message Expansion in Threshold Schemes., and . CRYPTO, volume 263 of Lecture Notes in Computer Science, page 266-274. Springer, (1986)Information Theory Without the Finiteness Assumption, II: Unfolding the DES.. CRYPTO, volume 218 of Lecture Notes in Computer Science, page 282-337. Springer, (1985)Infinite Structures in Information Theory., and . CRYPTO, page 39-50. Plenum Press, New York, (1982)Security Proofs for Information Protection Systems., and . S&P, page 75-88. IEEE Computer Society, (1981)Construction and Categories of Codes., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 266-277. Springer, (2000)All sail, no anchor II: Acceptable high-end PKI., and . Int. J. Inf. Sec., 2 (2): 66-77 (2004)Security of Number Theoretic Public Key Cryptosystems against Random Attack, I., and . Cryptologia, 2 (4): 305-321 (1978)Security of Ramp Schemes., and . CRYPTO, volume 196 of Lecture Notes in Computer Science, page 242-268. Springer, (1984)Random coding technique for digital fingerprinting codes: fighting two pirates revisited., and . ISIT, page 203. IEEE, (2004)Cryptosystems Based on an Analog of Heat Flow., and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 306-329. Springer, (1987)