| Publication | Date of Publication | Type |
|---|
Secret Sharing Schemes for (k, n)-Consecutive Access Structures Cryptology and Network Security | 2023-06-28 | Paper |
On the Computational Security of a Distributed Key Distribution Scheme IEEE Transactions on Computers | 2018-06-12 | Paper |
New results and applications for multi-secret sharing schemes Designs, Codes and Cryptography | 2014-09-04 | Paper |
Sharing many secrets with computational provable security Information Processing Letters | 2014-04-11 | Paper |
Signcryption schemes with threshold unsigncryption, and applications Designs, Codes and Cryptography | 2014-03-17 | Paper |
On server trust in private proxy auctions Electronic Commerce Research | 2010-11-30 | Paper |
A new algorithm to search for small nonzero \(|x^3-y^2|\) values Mathematics of Computation | 2010-11-07 | Paper |
Fully secure threshold unsigncryption Provable Security | 2010-10-12 | Paper |
Flaws in some self-healing key distribution schemes with revocation Information Processing Letters | 2010-08-16 | Paper |
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures Lecture Notes in Computer Science | 2010-03-31 | Paper |
Distributed RSA Signature Schemes for General Access Structures Lecture Notes in Computer Science | 2010-02-09 | Paper |
Correction to “Secret Sharing Schemes With Bipartite Access Structure” IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Distributed ring signatures from general dual access structures Designs, Codes and Cryptography | 2006-11-22 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| scientific article; zbMATH DE number 2043344 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1941251 (Why is no real title available?) | 2003-06-29 | Paper |
Generation of key predistribution schemes using secret sharing schemes Discrete Applied Mathematics | 2003-06-10 | Paper |
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Information Processing Letters | 2003-01-21 | Paper |
Taking cube roots in \(\mathbb Z_{m}\) Applied Mathematics Letters | 2002-09-03 | Paper |
Weighted threshold secret sharing schemes Information Processing Letters | 2002-07-25 | Paper |
Secret sharing schemes with detection of cheaters for a general access structure Designs, Codes and Cryptography | 2002-05-28 | Paper |
| Generation of key predistribution schemes using secret sharing schemes | 2001-10-14 | Paper |
Secret sharing schemes with bipartite access structure IEEE Transactions on Information Theory | 2001-03-19 | Paper |
| scientific article; zbMATH DE number 1390062 (Why is no real title available?) | 2000-01-17 | Paper |
| scientific article; zbMATH DE number 1303145 (Why is no real title available?) | 1999-06-17 | Paper |
Detection of cheaters in vector space secret sharing schemes Designs, Codes and Cryptography | 1999-04-13 | Paper |