Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the trade-off between storage and communication in broadcast encryption schemes., , and . IACR Cryptology ePrint Archive, (2001)Linear Broadcast Encryption Schemes., , , and . Discret. Appl. Math., 128 (1): 223-238 (2003)On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes., , , , , , and . IEEE Trans. Inf. Theory, 54 (6): 2644-2657 (2008)On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes., , , , , , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 327-343. Springer, (2005)Linear broadcast encryption schemes., , , and . Electron. Notes Discret. Math., (2001)Representing small identically self-dual matroids by self-dual codes., and . IACR Cryptology ePrint Archive, (2005)Linear threshold multisecret sharing schemes., , , and . Inf. Process. Lett., 112 (17-18): 667-673 (2012)Representing Small Identically Self-Dual Matroids by Self-Dual Codes., and . SIAM J. Discret. Math., 20 (4): 1046-1055 (2006)Linear Key Predistribution Schemes., , , and . Des. Codes Cryptogr., 25 (3): 281-298 (2002)On codes, matroids and secure multi-party computation from linear secret sharing schemes., , , , , , and . IACR Cryptology ePrint Archive, (2004)