Publication | Date of Publication | Type |
---|
Circular external difference families, graceful labellings and cyclotomy | 2023-10-04 | Paper |
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes | 2023-09-12 | Paper |
Boolean ring cryptographic equation solving | 2022-03-25 | Paper |
On the equivalence of authentication codes and robust (2, 2)-threshold schemes | 2021-06-17 | Paper |
PIR Schemes With Small Download Complexity and Low Storage Requirements | 2020-01-28 | Paper |
Characterising bimodal collections of sets in finite groups | 2019-11-22 | Paper |
Functional repair codes: a view from projective geometry | 2019-10-17 | Paper |
Characterising bimodal collections of sets in finite groups | 2019-03-27 | Paper |
Weighted external difference families and R-optimal AMD codes | 2019-01-22 | Paper |
Multi-prover proof of retrievability | 2019-01-11 | Paper |
Existence and non-existence results for strong external difference families | 2017-10-24 | Paper |
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks | 2017-07-27 | Paper |
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes | 2017-07-27 | Paper |
Localised multisecret sharing | 2017-04-03 | Paper |
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families | 2016-08-16 | Paper |
Cryptography | 2016-07-05 | Paper |
On encoding symbol degrees of array BP-XOR codes | 2016-04-11 | Paper |
Disjoint difference families and their applications | 2016-02-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3464681 | 2016-01-27 | Paper |
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs | 2015-12-07 | Paper |
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes | 2015-10-01 | Paper |
A unified approach to combinatorial key predistribution schemes for sensor networks | 2014-04-29 | Paper |
An Application-Oriented Framework for Wireless Sensor Network Key Establishment | 2013-12-06 | Paper |
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes | 2013-11-14 | Paper |
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage | 2013-11-12 | Paper |
Constructions for retransmission permutation arrays | 2012-11-28 | Paper |
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures | 2012-02-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q3089173 | 2011-08-24 | Paper |
Honeycomb arrays | 2010-12-16 | Paper |
Yet another hat game | 2010-06-16 | Paper |
Combinatorial batch codes | 2010-03-10 | Paper |
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic | 2010-01-07 | Paper |
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal | 2009-03-03 | Paper |
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks | 2009-01-09 | Paper |
Key Refreshing in Wireless Sensor Networks | 2009-01-09 | Paper |
A geometric view of cryptographic equation solving | 2008-08-11 | Paper |
Sliding-window dynamic frameproof codes | 2007-09-20 | Paper |
Sequential and dynamic frameproof codes | 2007-09-20 | Paper |