Author of the publication

Randomized Traitor Tracing Algorithms for Broadcast Security.

, and . Security and Management, page 584-590. CSREA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Renyi Entropies and their Applications to Guessing Attacks in Cryptography.. IACR Cryptology ePrint Archive, (2018)On the Construction of Binary Sequence Families With Low Correlation and Large Sizes., , and . IEEE Trans. Inf. Theory, 59 (2): 1082-1089 (2013)Traitor Tracing Against Powerful Attacks Using Combinatorial Designs., , and . AAECC, volume 3857 of Lecture Notes in Computer Science, page 215-224. Springer, (2006)New Lower Bounds on the Periodic Crosscorrelation of QAM Codes with Arbitrary Energy.. AAECC, volume 1719 of Lecture Notes in Computer Science, page 410-419. Springer, (1999)Testing Stream Ciphers by Finding the Longest Substring of a Given Density., , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 122-133. Springer, (2009)Fast computation of Boolean influences.. ISIT, page 1641-1645. IEEE, (2008)Randomness testing and comparison of classical and quantum bit generators., and . ISCC, page 1029-1032. IEEE Computer Society, (2017)Entropy of the Retina Template., , , , , , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 1250-1259. Springer, (2009)Community Detection in Bipartite Networks Using Random Walks., , and . CompleNet, volume 549 of Studies in Computational Intelligence, page 157-165. Springer, (2014)Low Probability of Intercept properties of some binary sequence families with good correlation properties., and . ISIT, page 1226-1230. IEEE, (2012)