Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface: geometry, combinatorial designs and cryptology., , and . Des. Codes Cryptogr., 64 (1-2): 1-2 (2012)Algebraic Properties of Cryptosystem PGM., and . J. Cryptol., 5 (3): 167-183 (1992)The Number of Tilings of a Block with Blocks., and . Eur. J. Comb., 9 (4): 317-330 (1988)Foreword.. J. Math. Cryptol., 7 (3): 181-182 (2013)Prediction Trees and Lossless Image Compression: An Extended Abstract., , and . Data Compression Conference, page 83-92. IEEE Computer Society, (1991)Secure and Efficient Key Management in Mobile Ad Hoc Networks., , , and . IPDPS, IEEE Computer Society, (2005)Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations., , , , , and . EURASIP J. Inf. Secur., (2007)Crypto applications of combinatorial group theory., and . Information Security, Coding Theory and Related Combinatorics, volume 29 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2011)New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups., , and . J. Cryptol., 15 (4): 285-297 (2002)A Public Key Cryptosystem Based on Non-abelian Finite Groups., , , and . J. Cryptol., 22 (1): 62-74 (2009)