Author of the publication

Secure Audio Teleconference.

, , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 418-426. Springer, (1987)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes., and . J. Cryptol., 5 (3): 153-166 (1992)Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems., , and . CRYPTO, page 39-42. Plenum Press, New York, (1983)Secure Audio Teleconference., , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 418-426. Springer, (1987)Gradual and Verifiable Release of a Secret., , , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 156-166. Springer, (1987)On Privacy Homomorphisms (Extended Abstract)., and . EUROCRYPT, volume 304 of Lecture Notes in Computer Science, page 117-125. Springer, (1987)A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems., , and . CRYPTO, page 289-301. Plenum Press, New York, (1982)On the Classification of Idea Secret Sharing Schemes., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 278-285. Springer, (1989)A Survey of Hardware Implementation of RSA (Abstract).. CRYPTO, volume 435 of Lecture Notes in Computer Science, page 368-370. Springer, (1989)Fast Exponentiation with Precomputation (Extended Abstract)., , , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 200-207. Springer, (1992)Structure in the S-boxes of the DES., , and . CRYPTO, volume 263 of Lecture Notes in Computer Science, page 3-8. Springer, (1986)