Author of the publication

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.

, and . WCC, volume 3969 of Lecture Notes in Computer Science, page 275-290. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Trade-offs in Threshold Implementations., , and . ICECS, page 751-754. IEEE, (2019)On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes., and . WCC, volume 3969 of Lecture Notes in Computer Science, page 275-290. Springer, (2005)Some Applications of Bounds for Designs to the Cryptography., and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 25-34. Springer, (1999)A Modification of Jarecki and Saxena Proactive RSA Signature Scheme., and . ISIT, page 1026-1029. IEEE, (2007)On Unconditionally Secure Distributed Oblivious Transfer., , , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 395-408. Springer, (2002)On Multiplicative Linear Secret Sharing Schemes., , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 135-147. Springer, (2003)On the Size of Monotone Span Programs., , and . SCN, volume 3352 of Lecture Notes in Computer Science, page 249-262. Springer, (2004)Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 1-15. Springer, (2003)Error-Set Codes and Related Objects., , and . COCOON, volume 3595 of Lecture Notes in Computer Science, page 577-585. Springer, (2005)CAPABARA: A Combined Attack on CAPA., , and . COSADE, volume 14595 of Lecture Notes in Computer Science, page 76-89. Springer, (2024)