Author of the publication

Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes.

, and . J. Cryptol., 5 (3): 153-166 (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized mix functions and orthogonal equitable rectangles.. IACR Cryptology ePrint Archive, (2007)Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes., , and . IACR Cryptology ePrint Archive, (2008)A bound on the size of separating hash families, , , and . J. Comb. Theory Ser. A, 115 (7): 1246--1256 (2008)New approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups, , and . Journal of Cryptology, 15 (4): 285--297 (2002)Perfect hash families from transversal designs., , and . Australas. J Comb., (2007)Some Improved Bounds for Secure Frameproof Codes and Related Separating Hash Families., and . IEEE Trans. Inf. Theory, 54 (6): 2508-2514 (2008)Ideal ramp schemes and related combinatorial objects.. Discret. Math., 341 (2): 299-307 (2018)Some Constructions and Bounds for authentication Codes.. CRYPTO, volume 263 of Lecture Notes in Computer Science, page 418-425. Springer, (1986)Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution., , and . CRYPTO, volume 1109 of Lecture Notes in Computer Science, page 387-400. Springer, (1996)The Lovász Local Lemma and Its Applications to some Combinatorial Arrays., , and . Des. Codes Cryptogr., 32 (1-3): 121-134 (2004)