Publication | Date of Publication | Type |
---|
Randomness in distribution protocols | 2019-04-29 | Paper |
On the number of random bits in totally private computation | 2019-01-10 | Paper |
Visual cryptography for grey level images | 2016-06-16 | Paper |
On secret sharing schemes | 2016-06-09 | Paper |
Lower bounds for robust secret sharing schemes | 2016-05-26 | Paper |
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution | 2015-11-11 | Paper |
Innovative approaches for security of small artefacts | 2014-10-24 | Paper |
Predicate Encryption with Partial Public Keys | 2010-12-07 | Paper |
Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
On Self-Healing Key Distribution Schemes | 2008-12-21 | Paper |
On unconditionally secure distributed oblivious transfer | 2007-08-20 | Paper |
Visual cryptography schemes with optimal pixel expansion | 2007-01-09 | Paper |
Visual cryptography for general access structures | 2006-10-10 | Paper |
Analysis and design of distributed key distribution centers | 2006-08-14 | Paper |
Automata, Languages and Programming | 2005-08-24 | Paper |
A linear algebraic approach to metering schemes | 2005-01-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4818854 | 2004-09-24 | Paper |
Design of self-healing key distribution schemes | 2004-08-16 | Paper |
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures | 2004-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448383 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448387 | 2004-02-18 | Paper |
Bounds and constructions for metering schemes. | 2004-01-26 | Paper |
Contrast Optimal Threshold Visual Cryptography Schemes | 2004-01-08 | Paper |
Hiding Information in Image Mosaics | 2003-10-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413869 | 2003-07-21 | Paper |
A ramp model for distributed key distribution schemes | 2003-06-10 | Paper |
A note on optimal metering schemes. | 2003-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536422 | 2002-11-25 | Paper |
Constructions and bounds for unconditionally secure non-interactive commitment schemes | 2002-08-21 | Paper |
Probability of shares in secret sharing schemes | 2002-07-25 | Paper |
Randomness complexity of private computation | 2002-04-21 | Paper |
Improved schemes for visual cryptography | 2002-04-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766874 | 2002-01-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2762750 | 2002-01-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741394 | 2001-10-14 | Paper |
A t-private k-database information retrieval scheme | 2001-01-01 | Paper |
Extended capabilities for visual cryptography | 2000-12-12 | Paper |
On the contrast in visual cryptography schemes | 2000-09-24 | Paper |
Anonymous secret sharing schemes | 2000-09-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4954414 | 2000-06-07 | Paper |
On a fallacious bound for authentication codes | 2000-05-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4940693 | 2000-03-01 | Paper |
A -restricted key agreement scheme | 1999-09-22 | Paper |
Perfectly secure key distribution for dynamic conferences | 1999-03-30 | Paper |
Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution | 1999-01-20 | Paper |
Unconditional secure conference key distribution schemes with disenrollment capability | 1999-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365725 | 1998-04-22 | Paper |
On the dealer's randomness required in secret sharing schemes | 1998-04-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365748 | 1998-01-14 | Paper |
Tight bounds on the information rate of secret sharing schemes | 1997-12-18 | Paper |
Randomness in distribution protocols | 1997-10-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341737 | 1997-07-20 | Paper |
On the information rate of secret sharing schemes | 1997-02-28 | Paper |
Fully dynamic secret sharing schemes | 1997-02-27 | Paper |
A note on dynamic threshold schemes | 1997-02-27 | Paper |
New bounds on the expected length of one-to-one codes | 1996-12-01 | Paper |
New bounds on the information rate of secret sharing schemes | 1995-12-17 | Paper |
Graph decompositions and secret sharing schemes | 1995-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318716 | 1995-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318691 | 1995-03-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4281571 | 1994-10-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279656 | 1994-02-22 | Paper |