Author of the publication

Bounds and trade-offs for Double-Base Number Systems.

, , and . Inf. Process. Lett., 111 (10): 488-493 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels., , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 17-34. Springer, (2007)Graph Design for Secure Multiparty Computation over Non-Abelian Groups., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 37-53. Springer, (2008)Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 167-181. Springer, (2007)A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries., , , , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 465-479 (2012)Privacy-Preserving Distributed Set Intersection., , and . IACR Cryptology ePrint Archive, (2007)Rateless Codes for the Multicast Stream Authentication Problem., and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 136-151. Springer, (2006)Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes., and . CANS, volume 5339 of Lecture Notes in Computer Science, page 196-213. Springer, (2008)Attack Simulation based Software Protection Assessment Method with Petri Net., , , , , , and . Int. J. Cyber Situational Aware., 1 (1): 152-181 (2016)An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 259-275. Springer, (2011)Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication., and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 293-307. Springer, (2007)