Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Authentication Codes: Bounds and Constructions., , and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 127-135. Springer, (2001)Explicit Sequence Expansions., , and . SETA, page 308-317. Springer, (1998)Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model., , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 481-501. Springer, (2015)Quantum Gilbert-Varshamov bound through symplectic self-orthogonal codes., and . ISIT, page 455-458. IEEE, (2011)Beating the probabilistic lower bound on perfect hashing., and . SODA, page 33-41. SIAM, (2021)Several Classes of (2m - 1, w, 2) Optical Orthogonal Codes., and . Electron. Notes Discret. Math., (2001)On Secret Sharing with Nonlinear Product Reconstruction., , , , and . SIAM J. Discret. Math., 29 (2): 1114-1131 (2015)Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack., , , and . EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 479-500. (2017)Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications., , , , and . ASIACRYPT (1), volume 14438 of Lecture Notes in Computer Science, page 106-138. Springer, (2023)Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over $Z/p^kZ $., , , , , , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 151-180. Springer, (2020)