Author of the publication

Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.

, , , and . Inf. Process. Lett., 99 (4): 154-157 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Butterfly PUF: Protecting IP on every FPGA., , , , and . HOST, page 67-70. IEEE Computer Society, (2008)Evaluation of 90nm 6T-SRAM as Physical Unclonable Function for secure key generation in wireless sensor nodes., , , , , , , , and . ISCAS, page 567-570. IEEE, (2011)Robust and Secure Biometrics: Some Application Examples., , , , , and . ISSE, page 196-203. Vieweg, (2006)Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions., , , , , , and . Information Systems Frontiers, 11 (1): 19-41 (2009)Intelligent Voltage Ramp-Up Time Adaptation for Temperature Noise Reduction on Memory-Based PUF Systems., , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (7): 1162-1175 (2015)Face Recognition with Renewable and Privacy Preserving Binary Templates., , , , and . AutoID, page 21-26. IEEE Computer Society, (2005)FPGA Intrinsic PUFs and Their Use for IP Protection., , , and . CHES, volume 4727 of Lecture Notes in Computer Science, page 63-80. Springer, (2007)Modeling SRAM start-up behavior for Physical Unclonable Functions., , , and . DFT, page 1-6. IEEE Computer Society, (2012)Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions., , , and . Inf. Process. Lett., 99 (4): 154-157 (2006)Face biometrics with renewable templates., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720J. SPIE, (2006)