New constructions for multicast re-keying schemes using perfect hash families
Proceedings of the 7th ACM conference on Computer and communications security
A Combinatorial Approach to Anonymous Membership Broadcast
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
Distributing the Encryption and Decryption of a Block Cipher
Designs, Codes and Cryptography
Generalised Cumulative Arrays in Secret Sharing
Designs, Codes and Cryptography
Explicit constructions of separating hash families from algebraic curves over finite fields
Designs, Codes and Cryptography
A sequence approach to linear perfect hash families
Designs, Codes and Cryptography
On generalized separating hash families
Journal of Combinatorial Theory Series A
Explicit constructions for perfect hash families
Designs, Codes and Cryptography
A combinatorial approach to X-tolerant compaction circuits
IEEE Transactions on Information Theory
Mediated traceable anonymous encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Geometric constructions of optimal linear perfect hash families
Finite Fields and Their Applications
Testers and their applications
Proceedings of the 5th conference on Innovations in theoretical computer science
Hi-index | 0.06 |