The following pages link to Marten van Dijk (Q287125):
Displaying 34 items.
- More information theoretical inequalities to be used in secret sharing? (Q287126) (← links)
- \texttt{FlipIt}: the game of ``stealthy takeover'' (Q380966) (← links)
- Improved constructions of secret sharing schemes by applying \((\lambda ,\omega )\)-decompositions (Q845708) (← links)
- Unconditionally secure group authentication (Q1265236) (← links)
- A general decomposition construction for incomplete secret sharing schemes (Q1281416) (← links)
- A linear construction of secret sharing schemes (Q1368734) (← links)
- (Q1406877) (redirect page) (← links)
- A practical protocol for advantage distillation and information reconciliation (Q1406878) (← links)
- On the information rate of perfect secret sharing schemes (Q1894277) (← links)
- Finite-sum smooth optimization with SARAH (Q2149950) (← links)
- Speeding up exponentiation using an untrusted computational resource (Q2491304) (← links)
- Weak-unforgeable tags for secure supply chain management (Q2656934) (← links)
- Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM (Q2799094) (← links)
- (Q3126447) (← links)
- On Two Doubly Even Self-Dual Binary Codes of Length<tex>$160$</tex>and Minimum Weight<tex>$24$</tex> (Q3546796) (← links)
- Simultaneous zero-tailing of parallel concatenated codes (Q3546798) (← links)
- Capacity and Codes for Embedding Information in Gray-Scale Signals (Q3547790) (← links)
- Fully Homomorphic Encryption over the Integers (Q3563828) (← links)
- On a special class of broadcast channels with confidential messages (Q4340342) (← links)
- (Q4365724) (← links)
- (Q4368762) (← links)
- (Q4474270) (← links)
- Efficient encoding for a class of subspace subcodes (Q4503412) (← links)
- Path ORAM (Q4561506) (← links)
- Practical Security Analysis of PUF-Based Two-Player Protocols (Q4649781) (← links)
- (Q4706390) (← links)
- (Q4737241) (← links)
- Defending against the Unknown Enemy: Applying FlipIt to System Security (Q4909442) (← links)
- (Q5053196) (← links)
- New Convergence Aspects of Stochastic Gradient Algorithms (Q5214284) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311531) (← links)
- Practical Cryptography in High Dimensional Tori (Q5385732) (← links)
- Advances in Cryptology - ASIACRYPT 2003 (Q5902382) (← links)
- A theoretical framework for the analysis of physical unclonable function interfaces and its relation to the random oracle model (Q6176275) (← links)