From post

Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.

, , и . CANS, том 14342 из Lecture Notes in Computer Science, стр. 468-493. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deniable Secret Handshake Protocol - Revisited., , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 1266-1278. Springer, (2019)Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters., , , , и . ICISS, том 11281 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2018)XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra., и . ICICS, том 8958 из Lecture Notes in Computer Science, стр. 230-242. Springer, (2014)Proactive visual cryptographic schemes for general access structures., , , и . Multim. Tools Appl., 82 (27): 41987-42019 (ноября 2023)Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem., , и . Comput. Electr. Eng., (2022)Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing., , и . CANS, том 11829 из Lecture Notes in Computer Science, стр. 291-307. Springer, (2019)Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings., , , , и . ICISS, том 12553 из Lecture Notes in Computer Science, стр. 198-217. Springer, (2020)AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties., , и . NSS, том 12570 из Lecture Notes in Computer Science, стр. 292-308. Springer, (2020)3-Party Adversarial Cryptography., , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 247-258. Springer, (2020)Password Protected Secret Sharing from Lattices., , , и . ACNS (1), том 12726 из Lecture Notes in Computer Science, стр. 442-459. Springer, (2021)