Author of the publication

Some Applications of Bounds for Designs to the Cryptography.

, and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 25-34. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Applications of Bounds for Designs to the Cryptography., and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 25-34. Springer, (1999)Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO)., , , , , , , , , and 3 other author(s). Cryptologia, 43 (2): 138-174 (2019)On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes., and . WCC, volume 3969 of Lecture Notes in Computer Science, page 275-290. Springer, (2005)On Unconditionally Secure Distributed Oblivious Transfer., , , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 395-408. Springer, (2002)Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm., , and . BalkanCryptSec, volume 9540 of Lecture Notes in Computer Science, page 31-42. Springer, (2015)Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application., , , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 309-323. Springer, (2009)On the Non-minimal Codewords in Binary Reed-Muller Codes., , and . Discret. Appl. Math., 128 (1): 65-74 (2003)My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks., and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 35-55. Springer, (2020)Public-Key Encryption with Delegated Search., , , and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 532-549. (2011)A Modification of Jarecki and Saxena Proactive RSA Signature Scheme., and . ISIT, page 1026-1029. IEEE, (2007)