From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Audio Teleconference., , и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 418-426. Springer, (1987)Gradual and Verifiable Release of a Secret., , , и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 156-166. Springer, (1987)Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes., и . J. Cryptol., 5 (3): 153-166 (1992)Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems., , и . CRYPTO, стр. 39-42. Plenum Press, New York, (1983)Fast Exponentiation with Precomputation (Extended Abstract)., , , и . EUROCRYPT, том 658 из Lecture Notes in Computer Science, стр. 200-207. Springer, (1992)On the Classification of Idea Secret Sharing Schemes., и . CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 278-285. Springer, (1989)A Survey of Hardware Implementation of RSA (Abstract).. CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 368-370. Springer, (1989)A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems., , и . CRYPTO, стр. 289-301. Plenum Press, New York, (1982)On Privacy Homomorphisms (Extended Abstract)., и . EUROCRYPT, том 304 из Lecture Notes in Computer Science, стр. 117-125. Springer, (1987)Cryptanalysis of the Yagisawa Public Key Cryptosystem.. EUROCRYPT, стр. 21-22. (1986)