From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Classification of cubic (n-4)-resilient Boolean functions., , , и . IEEE Trans. Inf. Theory, 52 (4): 1670-1676 (2006)On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions., , , и . IEEE Trans. Inf. Theory, 51 (3): 1182-1189 (2005)Exploring the storj network: a security analysis., , , , и . SAC, стр. 257-264. ACM, (2021)First-Order Hardware Sharings of the AES., , и . IACR Cryptol. ePrint Arch., (2021)SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice., , и . IACR Cryptol. ePrint Arch., (2024)Applying General Access Structure to Proactive Secret Sharing Schemes., , , и . IACR Cryptology ePrint Archive, (2002)On the Size of Monotone Span Programs., , и . SCN, том 3352 из Lecture Notes in Computer Science, стр. 249-262. Springer, (2004)On a Resynchronization Weakness in a Class of Combiners with Memory., , , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 164-173. Springer, (2002)Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case., , и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2003)On Multiplicative Linear Secret Sharing Schemes., , и . INDOCRYPT, том 2904 из Lecture Notes in Computer Science, стр. 135-147. Springer, (2003)