Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Returning and non-returning parallel communicating finite automata are equivalent., , and . ITA, 41 (2): 137-145 (2007)Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules., and . Int. J. Comput. Math., 86 (4): 567-576 (2009)Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience., , and . ICITS, volume 5973 of Lecture Notes in Computer Science, page 74-92. Springer, (2009)Network of Evolutionary Processors with Splicing Rules., and . IWINAC (1), volume 3561 of Lecture Notes in Computer Science, page 290-299. Springer, (2005)Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality., , , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 101-122. Springer, (2007)Round Efficient Unconditionally Secure Multiparty Computation Protocol., , and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 185-199. Springer, (2008)Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited., , and . SCN, volume 5229 of Lecture Notes in Computer Science, page 309-326. Springer, (2008)On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary., , , , and . PODC, page 115-124. ACM, (2008)Network of Evolutionary Processors with Splicing Rules and Forbidding Context., and . IWINAC (1), volume 3561 of Lecture Notes in Computer Science, page 300-309. Springer, (2005)Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary., , , and . IACR Cryptology ePrint Archive, (2008)