Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying General Access Structure to Proactive Secret Sharing Schemes., , , and . IACR Cryptology ePrint Archive, (2002)On Multiplicative Linear Secret Sharing Schemes., , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 135-147. Springer, (2003)On the Size of Monotone Span Programs., , and . SCN, volume 3352 of Lecture Notes in Computer Science, page 249-262. Springer, (2004)On a Resynchronization Weakness in a Class of Combiners with Memory., , , and . SCN, volume 2576 of Lecture Notes in Computer Science, page 164-173. Springer, (2002)Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 1-15. Springer, (2003)Error-Set Codes and Related Objects., , and . COCOON, volume 3595 of Lecture Notes in Computer Science, page 577-585. Springer, (2005)Cryptographic Fault Diagnosis using VerFI., , , and . IACR Cryptology ePrint Archive, (2019)On the Non-Minimal codewords of weight 2dmin in the binary Reed-Muller Code., , and . Electron. Notes Discret. Math., (2001)Classification of cubic (n-4)-resilient Boolean functions., , , and . IEEE Trans. Inf. Theory, 52 (4): 1670-1676 (2006)On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions., , , and . IEEE Trans. Inf. Theory, 51 (3): 1182-1189 (2005)