Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incidence structures applied to cryptography., and . Discrete Mathematics, (1992)On "the Power of Verification Queries" in Unconditionally Secure Message Authentication., , and . Discrete Math., Alg. and Appl., 3 (3): 287-304 (2011)Cryptanalysis of a homomorphic public-key cryptosystem over a finite group., , and . IACR Cryptology ePrint Archive, (2006)Information Theoretic Bounds on Authentication Systems in Query Model., and . IACR Cryptology ePrint Archive, (2006)Size of Broadcast in Threshold Schemes with Disenrollment., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 71-88. Springer, (2002)Threshold MACs., , , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 237-252. Springer, (2002)Relations between Two Perfect Ternary Sequence Constructions., and . Des. Codes Cryptogr., 2 (4): 325-332 (1992)On GMW Designs and Cyclic Hadamard Designs., and . Des. Codes Cryptogr., 10 (2): 185-191 (1997)Embeddings of Steiner Quadruple Systems., and . Ars Comb., (2002)Embeddings of Steiner Quadruple Systems using Extensions of Linear Spaces., and . Ars Comb., (2004)