From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups, , и . Journal of Cryptology, 15 (4): 285--297 (2002)Generalized mix functions and orthogonal equitable rectangles.. IACR Cryptology ePrint Archive, (2007)Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes., , и . IACR Cryptology ePrint Archive, (2008)Ideal ramp schemes and related combinatorial objects.. Discret. Math., 341 (2): 299-307 (2018)Perfect hash families from transversal designs., , и . Australas. J Comb., (2007)The Lovász Local Lemma and Its Applications to some Combinatorial Arrays., , и . Des. Codes Cryptogr., 32 (1-3): 121-134 (2004)Some Constructions and Bounds for authentication Codes.. CRYPTO, том 263 из Lecture Notes in Computer Science, стр. 418-425. Springer, (1986)Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution., , и . CRYPTO, том 1109 из Lecture Notes in Computer Science, стр. 387-400. Springer, (1996)A Critical Analysis and Improvement of AACS Drive-Host Authentication., и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2008)Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures., и . Selected Areas in Cryptography, том 1758 из Lecture Notes in Computer Science, стр. 200-214. Springer, (1999)