From post

Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.

, , , , и . EUROCRYPT (2), том 9057 из Lecture Notes in Computer Science, стр. 313-336. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Perfectly Secure Message Transmission in Two Rounds., и . TCC (B1), том 9985 из Lecture Notes in Computer Science, стр. 286-304. (2016)A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment., , , , , , , , , и 2 other автор(ы). CoRR, (2018)Universally Secure Network Coding with feedback., и . ISIT, стр. 2339-2343. IEEE, (2016)Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions., , , , и . EUROCRYPT (2), том 9057 из Lecture Notes in Computer Science, стр. 313-336. Springer, (2015)Cheater Detection in SPDZ Multiparty Computation., и . ICITS, том 10015 из Lecture Notes in Computer Science, стр. 151-176. (2016)Increasing Access to Social Welfare Programmes with Proportional Data Usage., и . ERCIM News, (2021)