Author of the publication

Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals.

, and . EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 119-133. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple burst-correcting array codes., , and . IEEE Trans. Inf. Theory, 34 (5): 1061-1066 (1988)Constructions and Properties of k out of n Visual Secret Sharing Schemes., and . Des. Codes Cryptogr., 11 (2): 179-196 (1997)On the Security of Digital Signature Schemes Based on Error-Correcting Codes., , and . Des. Codes Cryptogr., 28 (2): 187-199 (2003)Two observations concerning optimum cyclic burst-correcting codes., and . Discret. Math., 184 (1-3): 111-120 (1998)Two-dimensional burst identification codes and their use in burst correction., , and . IEEE Trans. Inf. Theory, 34 (3): 494-504 (1988)Approaching capacity by equiprobable signaling on the Gaussian channel., and . IEEE Trans. Inf. Theory, 39 (5): 1714-1716 (1993)Symbol synchronization in convolutionally coded systems (Corresp.)., , and . IEEE Trans. Inf. Theory, 25 (3): 362-365 (1979)On maximum likelihood soft-decision decoding of binary linear codes., , and . IEEE Trans. Inf. Theory, 39 (1): 197-203 (1993)Upper bounds on |C2| for a uniquely decodable code pair (C1, C2) for a two-access binary adder channel.. IEEE Trans. Inf. Theory, 29 (3): 386-389 (1983)Two "Dual" Families of Nearly-Linear Codes over Zp, p odd., and . Appl. Algebra Eng. Commun. Comput., 11 (4): 313-329 (2001)