Publication | Date of Publication | Type |
---|
Multi-stage proof-of-works: properties and vulnerabilities | 2023-10-17 | Paper |
Probabilistic secret sharing | 2021-08-04 | Paper |
Secret sharing schemes for infinite sets of participants: a new design technique | 2021-02-15 | Paper |
Security of public-key cryptosystems based on Chebyshev polynomials | 2017-11-20 | Paper |
Private set intersection: new generic constructions and feasibility results | 2017-10-12 | Paper |
Secure computation without computers | 2017-03-16 | Paper |
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography | 2017-01-06 | Paper |
All or nothing at all | 2016-12-06 | Paper |
Secure Two-Party Computation: A Visual Way | 2015-09-30 | Paper |
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes | 2015-09-30 | Paper |
Anonymous protocols: notions and equivalence | 2015-05-22 | Paper |
Size-Hiding in Private Set Intersection: Existential Results and Constructions | 2012-07-23 | Paper |
Fighting Pirates 2.0 | 2011-06-28 | Paper |
Theoretical Computer Science | 2010-02-23 | Paper |
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation | 2009-12-03 | Paper |
Variations on a theme by Akl and Taylor: security and tradeoffs | 2009-12-01 | Paper |
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants | 2009-10-16 | Paper |
Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
On Self-Healing Key Distribution Schemes | 2008-12-21 | Paper |
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol | 2008-06-13 | Paper |
On unconditionally secure distributed oblivious transfer | 2007-08-20 | Paper |
Analysis and design of distributed key distribution centers | 2006-08-14 | Paper |
Properties and constraints of cheating-immune secret sharing schemes | 2006-04-28 | Paper |
Automata, Languages and Programming | 2005-08-24 | Paper |
Design of self-healing key distribution schemes | 2004-08-16 | Paper |
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures | 2004-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4736424 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448376 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448383 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448387 | 2004-02-18 | Paper |
Contrast Optimal Threshold Visual Cryptography Schemes | 2004-01-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418542 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413869 | 2003-07-21 | Paper |
On Unconditionally Secure Robust Distributed Key Distribution Centers | 2003-07-16 | Paper |
A ramp model for distributed key distribution schemes | 2003-06-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741394 | 2001-10-14 | Paper |
A t-private k-database information retrieval scheme | 2001-01-01 | Paper |
A -restricted key agreement scheme | 1999-09-22 | Paper |