| Publication | Date of Publication | Type |
|---|
| Decomposing complete graphs into isomorphic complete multipartite graphs | 2024-10-02 | Paper |
Circular external difference families, graceful labellings and cyclotomy Discrete Mathematics | 2024-07-10 | Paper |
| Circular external difference families, graceful labellings and cyclotomy | 2023-10-04 | Paper |
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes Advances in Mathematics of Communications | 2023-09-12 | Paper |
| Boolean ring cryptographic equation solving | 2022-03-25 | Paper |
On the equivalence of authentication codes and robust (2, 2)-threshold schemes Journal of Mathematical Cryptology | 2021-06-17 | Paper |
PIR Schemes With Small Download Complexity and Low Storage Requirements IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Characterising bimodal collections of sets in finite groups Archiv der Mathematik | 2019-11-22 | Paper |
Characterising bimodal collections of sets in finite groups Archiv der Mathematik | 2019-11-22 | Paper |
Functional repair codes: a view from projective geometry Designs, Codes and Cryptography | 2019-10-17 | Paper |
Functional repair codes: a view from projective geometry Designs, Codes and Cryptography | 2019-10-17 | Paper |
Characterising bimodal collections of sets in finite groups (available as arXiv preprint) | 2019-03-27 | Paper |
Weighted external difference families and R-optimal AMD codes Discrete Mathematics | 2019-01-22 | Paper |
Weighted external difference families and R-optimal AMD codes Discrete Mathematics | 2019-01-22 | Paper |
Multi-prover proof of retrievability Journal of Mathematical Cryptology | 2019-01-11 | Paper |
Multi-prover proof of retrievability Journal of Mathematical Cryptology | 2019-01-11 | Paper |
Existence and non-existence results for strong external difference families Discrete Mathematics | 2017-10-24 | Paper |
Existence and non-existence results for strong external difference families Discrete Mathematics | 2017-10-24 | Paper |
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Localised multisecret sharing Cryptography and Communications | 2017-04-03 | Paper |
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families Discrete Mathematics | 2016-08-16 | Paper |
| Cryptography. Theory and practice | 2016-07-05 | Paper |
On encoding symbol degrees of array BP-XOR codes Cryptography and Communications | 2016-04-11 | Paper |
Disjoint difference families and their applications Designs, Codes and Cryptography | 2016-02-02 | Paper |
| Applications of Galois geometry to cryptology | 2016-01-27 | Paper |
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs Journal of Mathematical Cryptology | 2015-12-07 | Paper |
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs Journal of Mathematical Cryptology | 2015-12-07 | Paper |
Practical approaches to varying network size in combinatorial key predistribution schemes Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
A unified approach to combinatorial key predistribution schemes for sensor networks Designs, Codes and Cryptography | 2014-04-29 | Paper |
An application-oriented framework for wireless sensor network key establishment Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes Cryptography and Communications | 2013-11-14 | Paper |
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage Journal of Mathematical Cryptology | 2013-11-12 | Paper |
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage Journal of Mathematical Cryptology | 2013-11-12 | Paper |
Constructions for retransmission permutation arrays Designs, Codes and Cryptography | 2012-11-28 | Paper |
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures Cryptography and Communications | 2012-02-21 | Paper |
| Putting dots in triangles | 2011-08-24 | Paper |
Honeycomb arrays The Electronic Journal of Combinatorics | 2010-12-16 | Paper |
Honeycomb arrays The Electronic Journal of Combinatorics | 2010-12-16 | Paper |
Honeycomb arrays The Electronic Journal of Combinatorics | 2010-12-16 | Paper |
Yet another hat game The Electronic Journal of Combinatorics | 2010-06-16 | Paper |
Yet another hat game The Electronic Journal of Combinatorics | 2010-06-16 | Paper |
Yet another hat game The Electronic Journal of Combinatorics | 2010-06-16 | Paper |
Combinatorial batch codes Advances in Mathematics of Communications | 2010-03-10 | Paper |
Geometric ideas for cryptographic equation solving in even characteristic Cryptography and Coding | 2010-01-07 | Paper |
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal Journal of Mathematical Cryptology | 2009-03-03 | Paper |
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks Lecture Notes in Computer Science | 2009-01-09 | Paper |
Key Refreshing in Wireless Sensor Networks Lecture Notes in Computer Science | 2009-01-09 | Paper |
A geometric view of cryptographic equation solving Journal of Mathematical Cryptology | 2008-08-11 | Paper |
Sequential and dynamic frameproof codes Designs, Codes and Cryptography | 2007-09-20 | Paper |
Sliding-window dynamic frameproof codes Designs, Codes and Cryptography | 2007-09-20 | Paper |