Author of the publication

On the Optimization of Bipartite Secret Sharing Schemes.

, , , and . ICITS, volume 5973 of Lecture Notes in Computer Science, page 93-109. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs"., , and . IEEE Trans. Computers, 45 (6): 768 (1996)Taking cube roots in Zm., and . Appl. Math. Lett., 15 (6): 703-708 (2002)Spanners of Underlying Graphs of Iterated Line Digraphs., and . SIROCCO, page 180-194. Carleton Scientific, (1996)On secret sharing with nonlinear product reconstruction., , , , and . IACR Cryptology ePrint Archive, (2013)Secret sharing schemes with three or four minimal qualified subsets., and . IACR Cryptology ePrint Archive, (2002)Optimal Algebraic Manipulation Detection Codes., , and . IACR Cryptology ePrint Archive, (2014)Representing Small Identically Self-Dual Matroids by Self-Dual Codes., and . SIAM J. Discret. Math., 20 (4): 1046-1055 (2006)Ideal Multipartite Secret Sharing Schemes., , and . J. Cryptol., 25 (3): 434-463 (2012)Matroids Can Be Far from Ideal Secret Sharing., , and . TCC, volume 4948 of Lecture Notes in Computer Science, page 194-212. Springer, (2008)Ideal Hierarchical Secret Sharing Schemes., and . TCC, volume 5978 of Lecture Notes in Computer Science, page 219-236. Springer, (2010)