Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear threshold multisecret sharing schemes., , , and . Inf. Process. Lett., 112 (17-18): 667-673 (2012)Recent Advances in Non-perfect Secret Sharing Schemes.. CiE, volume 9709 of Lecture Notes in Computer Science, page 89-98. Springer, (2016)Common information, matroid representation, and secret sharing for matroid ports., , , and . Des. Codes Cryptogr., 89 (1): 143-166 (2021)Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts., , , , , and . IEEE Trans. Computers, 65 (2): 466-479 (2016)HLS-Based HW/SW Co-Design of the Post-Quantum Classic McEliece Cryptosystem., , , , and . FPL, page 52-59. IEEE, (2021)One-out-of-q OT Combiners., and . IACR Cryptol. ePrint Arch., (2021)Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing., , , and . IEEE Trans. Inf. Theory, 66 (11): 7088-7100 (2020)Ideal Multipartite Secret Sharing Schemes., , and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 448-465. Springer, (2007)One-Out-of-q OT Combiners., and . IEEE Trans. Inf. Theory, 70 (4): 2984-2998 (April 2024)Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search, and . CoRR, (2012)