Author of the publication

An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.

, , , , , , and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 80-89. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error-correcting codes and cryptography., and . Appl. Algebra Eng. Commun. Comput., 19 (3): 213-228 (2008)Unconditionally Secure Anonymous Encryption and Group Authentication., , , and . Comput. J., 49 (3): 310-321 (2006)CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Formally verifiable features in embedded vehicular security systems., , , , , and . VNC, page 1-7. IEEE, (2009)Secret-Public Storage Trade-Off for Broadcast Encryption Key Management., , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 375-387. Springer, (2004)LDPC codes with fixed initialization decoding over binary symmetric channel., , and . ISIT, page 784-788. IEEE, (2010)Rates for bit commitment and coin tossing from noisy correlation., , , and . ISIT, page 45. IEEE, (2004)Non-binary quasi-cyclic quantum LDPC codes., , , and . ISIT, page 653-657. IEEE, (2011)An Image Sanitizing Scheme Using Digital Watermarking., , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 474-482. Springer, (2009)Authenticated key exchange for wireless security., , and . WCNC, page 1180-1186. IEEE, (2005)