Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gregory A. Kabatiansky
@inproceedings{DBLP:conf/isncc/FernandezKKMR23, author = {Marcel Fernandez and Grigory Kabatiansky and Ibrahim Kamel and Ying Miao and Tamer F. Rabie}, title = {Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323965}, doi = {10.1109/ISNCC58260.2023.10323965}, timestamp = {Thu, 07 Dec 2023 20:38:52 +0100}, biburl = {https://dblp.org/rec/conf/isncc/FernandezKKMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/FernandezKMT23, author = {Marcel Fernandez and Grigory Kabatiansky and Sebasti{\`{a}} Mart{\'{\i}}n and C{\'{e}}dric Tavernier}, title = {A constructive approach to multimedia codes with complete traceability resistant to {\(\delta\)}-noise}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France, April 23-28, 2023}, pages = {254--259}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ITW55543.2023.10161685}, doi = {10.1109/ITW55543.2023.10161685}, timestamp = {Wed, 05 Jul 2023 16:00:01 +0200}, biburl = {https://dblp.org/rec/conf/itw/FernandezKMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/EgorovaK21, author = {Elena Egorova and Gregory A. Kabatiansky}, title = {Separable Collusion-Secure Multimedia Codes}, journal = {Probl. Inf. Transm.}, volume = {57}, number = {2}, pages = {178--198}, year = {2021}, url = {https://doi.org/10.1134/S003294602102006X}, doi = {10.1134/S003294602102006X}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/EgorovaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EgorovaFK20, author = {Elena Egorova and Marcel Fernandez and Grigory Kabatiansky}, title = {On non-binary traceability set systems}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1885--1892}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00749-4}, doi = {10.1007/S10623-020-00749-4}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/EgorovaFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/EgorovaFKM20, author = {Elena Egorova and Marcel Fernandez and Gregory A. Kabatiansky and Ying Miao}, title = {Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise}, journal = {Probl. Inf. Transm.}, volume = {56}, number = {4}, pages = {388--398}, year = {2020}, url = {https://doi.org/10.1134/S0032946020040080}, doi = {10.1134/S0032946020040080}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/poit/EgorovaFKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbc/IvanovKKR20, author = {Fedor I. Ivanov and Grigory Kabatiansky and Eugeniy Krouk and Nikita Rumenko}, editor = {Marco Baldi and Edoardo Persichetti and Paolo Santini}, title = {A New Code-Based Cryptosystem}, booktitle = {Code-Based Cryptography - 8th International Workshop, CBCrypto 2020, Zagreb, Croatia, May 9-10, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12087}, pages = {41--49}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54074-6\_3}, doi = {10.1007/978-3-030-54074-6\_3}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cbc/IvanovKKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KabatianskyE20, author = {Grigory Kabatiansky and Elena Egorova}, title = {Adversarial multiple access channels and a new model of multimedia fingerprinting coding}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162248}, doi = {10.1109/CNS48642.2020.9162248}, timestamp = {Thu, 13 Aug 2020 14:43:08 +0200}, biburl = {https://dblp.org/rec/conf/cns/KabatianskyE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EgorovaFKL19, author = {Elena Egorova and Marcel Fernandez and Grigory Kabatiansky and Moon Ho Lee}, title = {Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {455--462}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0551-9}, doi = {10.1007/S10623-018-0551-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EgorovaFKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/Kabatiansky19, author = {Gregory A. Kabatiansky}, title = {Traceability Codes and Their Generalizations}, journal = {Probl. Inf. Transm.}, volume = {55}, number = {3}, pages = {283--294}, year = {2019}, url = {https://doi.org/10.1134/S0032946019030074}, doi = {10.1134/S0032946019030074}, timestamp = {Mon, 04 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/poit/Kabatiansky19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GuCKM19, author = {Yujie Gu and Minquan Cheng and Grigory Kabatiansky and Ying Miao}, title = {Probabilistic Existence Results for Parent-Identifying Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {10}, pages = {6160--6170}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2927020}, doi = {10.1109/TIT.2019.2927020}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GuCKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/Kabatiansky19, author = {Grigory Kabatiansky}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {371--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_21}, doi = {10.1007/978-3-030-16458-4\_21}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/c2si/Kabatiansky19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/EgorovaFK19, author = {Elena Egorova and Marcel Fernandez and Grigory Kabatiansky}, title = {A Construction of Traceability Set Systems with Polynomial Tracing Algorithm}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {2739--2742}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849353}, doi = {10.1109/ISIT.2019.8849353}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/EgorovaFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-01031, author = {Yujie Gu and Minquan Cheng and Grigory Kabatiansky and Ying Miao}, title = {Probabilistic Existence Results for Parent-Identifying Schemes}, journal = {CoRR}, volume = {abs/1906.01031}, year = {2019}, url = {http://arxiv.org/abs/1906.01031}, eprinttype = {arXiv}, eprint = {1906.01031}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-01031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoreiraFK18, author = {Jos{\'{e}} Moreira and Marcel Fern{\'{a}}ndez and Grigory Kabatiansky}, title = {Constructions of almost secure frameproof codes with applications to fingerprinting schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {785--802}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0359-z}, doi = {10.1007/S10623-017-0359-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MoreiraFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/KabatianskyL18, author = {Gregory A. Kabatiansky and Vladimir S. Lebedev}, title = {On Metric Dimension of Nonbinary Hamming Spaces}, journal = {Probl. Inf. Transm.}, volume = {54}, number = {1}, pages = {48--55}, year = {2018}, url = {https://doi.org/10.1134/S0032946018010040}, doi = {10.1134/S0032946018010040}, timestamp = {Fri, 11 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/KabatianskyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GritsenkoKLM17, author = {Vladimir Gritsenko and Grigory Kabatiansky and Vladimir S. Lebedev and Alexey Maevskiy}, title = {Signature codes for noisy multiple access adder channel}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {293--299}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0228-1}, doi = {10.1007/S10623-016-0228-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GritsenkoKLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/KabatianskyL17, author = {Grigory Kabatiansky and Ivan N. Landjev}, title = {Preface}, journal = {Electron. Notes Discret. Math.}, volume = {57}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.endm.2017.02.001}, doi = {10.1016/J.ENDM.2017.02.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/KabatianskyL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcta/EgorovaK17, author = {Elena Egorova and Grigory Kabatiansky}, editor = {{\'{A}}ngela I. Barbero and Vitaly Skachek and {\O}yvind Ytrehus}, title = {Analysis of Two Tracing Traitor Schemes via Coding Theory}, booktitle = {Coding Theory and Applications - 5th International Castle Meeting, {ICMCTA} 2017, Vihula, Estonia, August 28-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10495}, pages = {84--92}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66278-7\_8}, doi = {10.1007/978-3-319-66278-7\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icmcta/EgorovaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoreiraFK16, author = {Jos{\'{e}} Moreira and Marcel Fern{\'{a}}ndez and Grigory Kabatiansky}, title = {Almost separating and almost secure frameproof codes over q-ary alphabets}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {11--28}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0060-z}, doi = {10.1007/S10623-015-0060-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MoreiraFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/EgorovaFKL16, author = {Elena Egorova and Marcel Fernandez and Grigory A. Kabatiansky and Moon Ho Lee}, title = {Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {3043--3047}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541858}, doi = {10.1109/ISIT.2016.7541858}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/EgorovaFKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KabatianskyFE16, author = {Grigory Kabatiansky and Marcel Fernandez and Elena Egorova}, title = {Multimedia fingerprinting codes resistant against colluders and noise}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823904}, doi = {10.1109/WIFS.2016.7823904}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/KabatianskyFE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/VladutKL15, author = {Serge G. Vladut and Gregory A. Kabatiansky and V. V. Lomakov}, title = {On error correction with errors in both the channel and syndrome}, journal = {Probl. Inf. Transm.}, volume = {51}, number = {2}, pages = {132--138}, year = {2015}, url = {https://doi.org/10.1134/S0032946015020040}, doi = {10.1134/S0032946015020040}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/VladutKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KabatianskyVT15, author = {Grigory Kabatiansky and Serge G. Vladut and C{\'{e}}dric Tavernier}, editor = {Jens Groth}, title = {On the Doubly Sparse Compressed Sensing Problem}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {184--189}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_11}, doi = {10.1007/978-3-319-27239-9\_11}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/KabatianskyVT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/FernandezKM15, author = {Marcel Fernandez and Grigory Kabatiansky and Jos{\'{e}} Moreira}, title = {Almost IPP-codes or provably secure digital fingerprinting codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {1595--1599}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282725}, doi = {10.1109/ISIT.2015.7282725}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/FernandezKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FernandezEK15, author = {Marcel Fernandez and Elena Egorova and Grigory Kabatiansky}, title = {Binary fingerprinting codes - can we prove that someone is guilty?!}, booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2015, Roma, Italy, November 16-19, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WIFS.2015.7368558}, doi = {10.1109/WIFS.2015.7368558}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FernandezEK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KabatianskyTV15, author = {Grigory Kabatiansky and C{\'{e}}dric Tavernier and Serge G. Vladut}, title = {On the Doubly Sparse Compressed Sensing Problem}, journal = {CoRR}, volume = {abs/1509.07145}, year = {2015}, url = {http://arxiv.org/abs/1509.07145}, eprinttype = {arXiv}, eprint = {1509.07145}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KabatianskyTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BargK13, author = {Alexander Barg and Grigory Kabatiansky}, title = {Robust Parent-Identifying Codes and Combinatorial Arrays}, journal = {{IEEE} Trans. Inf. Theory}, volume = {59}, number = {2}, pages = {994--1003}, year = {2013}, url = {https://doi.org/10.1109/TIT.2012.2220522}, doi = {10.1109/TIT.2012.2220522}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BargK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MoreiraFK13, author = {Jos{\'{e}} Moreira and Marcel Fernandez and Grigory Kabatiansky}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {53--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_4}, doi = {10.1007/978-3-642-41383-4\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MoreiraFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BargK11, author = {Alexander Barg and Grigory Kabatiansky}, editor = {Serge Fehr}, title = {Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {202--205}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_18}, doi = {10.1007/978-3-642-20728-0\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/BargK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DumerKT11, author = {Ilya Dumer and Grigory Kabatiansky and C{\'{e}}dric Tavernier}, editor = {Alexander Kuleshov and Vladimir M. Blinovsky and Anthony Ephremides}, title = {Soft-decision list decoding of Reed-Muller codes with linear complexity}, booktitle = {2011 {IEEE} International Symposium on Information Theory Proceedings, {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011}, pages = {2303--2307}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIT.2011.6033973}, doi = {10.1109/ISIT.2011.6033973}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/DumerKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/FernandezKM11, author = {Marcel Fernandez and Grigory Kabatiansky and Jos{\'{e}} Moreira}, editor = {Alexander Kuleshov and Vladimir M. Blinovsky and Anthony Ephremides}, title = {Almost separating and almost secure frameproof codes}, booktitle = {2011 {IEEE} International Symposium on Information Theory Proceedings, {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011}, pages = {2696--2700}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIT.2011.6034061}, doi = {10.1109/ISIT.2011.6034061}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/FernandezKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MoreiraKF11, author = {Jos{\'{e}} Moreira and Grigory Kabatiansky and Marcel Fernandez}, title = {Lower bounds on almost-separating binary codes}, booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WIFS.2011.6123141}, doi = {10.1109/WIFS.2011.6123141}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/MoreiraKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KabatianskyS11, author = {Gregory A. Kabatiansky and Ben J. M. Smeets}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Authentication, From an Information Theoretic Perspective}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {63--65}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_377}, doi = {10.1007/978-1-4419-5906-5\_377}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KabatianskyS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BargK11, author = {Alexander Barg and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Fingerprinting}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {465--467}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_381}, doi = {10.1007/978-1-4419-5906-5\_381}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BargK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK11, author = {G. R. Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Secret Sharing Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1095--1097}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_389}, doi = {10.1007/978-1-4419-5906-5\_389}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK11a, author = {G. R. Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Shamir's Threshold Scheme}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1193--1194}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_390}, doi = {10.1007/978-1-4419-5906-5\_390}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK11b, author = {G. R. Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Share}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1195--1196}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_391}, doi = {10.1007/978-1-4419-5906-5\_391}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK11c, author = {G. R. Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Visual Secret Sharing Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1363--1364}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_393}, doi = {10.1007/978-1-4419-5906-5\_393}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BargK11, author = {Alexander Barg and Grigory Kabatiansky}, title = {Robust parent-identifying codes and combinatorial arrays}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2011}, url = {http://eprint.iacr.org/2011/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BargK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/BargBKT10, author = {Alexander Barg and G. Robert Blakley and Grigory Kabatiansky and C{\'{e}}dric Tavernier}, editor = {Marcus Greferath and Joachim Rosenthal and Alexander Barg and Gilles Z{\'{e}}mor}, title = {Robust parent-identifying codes}, booktitle = {2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland, August 30 - September 3, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CIG.2010.5592920}, doi = {10.1109/CIG.2010.5592920}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/itw/BargBKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/GalandK09, author = {Fabien Galand and Gregory A. Kabatiansky}, title = {Coverings, centered codes, and combinatorial steganography}, journal = {Probl. Inf. Transm.}, volume = {45}, number = {3}, pages = {289}, year = {2009}, url = {https://doi.org/10.1134/S0032946009030107}, doi = {10.1134/S0032946009030107}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/GalandK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0909-1051, author = {Gregory A. Kabatiansky and G. Oshanin}, title = {Finding passwords by random walks: How long does it take?}, journal = {CoRR}, volume = {abs/0909.1051}, year = {2009}, url = {http://arxiv.org/abs/0909.1051}, eprinttype = {arXiv}, eprint = {0909.1051}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0909-1051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DumerKT08, author = {Ilya Dumer and Gregory A. Kabatiansky and C{\'{e}}dric Tavernier}, title = {List Decoding of Biorthogonal Codes and the Hadamard Transform With Linear Complexity}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {10}, pages = {4488--4492}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.929014}, doi = {10.1109/TIT.2008.929014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DumerKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/DumerKT07, author = {Ilya Dumer and Gregory A. Kabatiansky and C{\'{e}}dric Tavernier}, title = {List decoding of the first-order binary Reed-Muller codes}, journal = {Probl. Inf. Transm.}, volume = {43}, number = {3}, pages = {225--232}, year = {2007}, url = {https://doi.org/10.1134/S0032946007030052}, doi = {10.1134/S0032946007030052}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/DumerKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DumerKT07, author = {Ilya Dumer and Grigory Kabatiansky and C{\'{e}}dric Tavernier}, title = {Soft-Decision List Decoding with Linear Complexity for the First-Order Reed-Muller Codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {1346--1349}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557410}, doi = {10.1109/ISIT.2007.4557410}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/DumerKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DumerKT06, author = {Ilya Dumer and Grigory Kabatiansky and C{\'{e}}dric Tavernier}, title = {List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {138--142}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261690}, doi = {10.1109/ISIT.2006.261690}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/DumerKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/Kabatiansky05, author = {Gregory A. Kabatiansky}, title = {Codes for Copyright Protection: The Case of Two Pirates}, journal = {Probl. Inf. Transm.}, volume = {41}, number = {2}, pages = {182--186}, year = {2005}, url = {https://doi.org/10.1007/s11122-005-0022-6}, doi = {10.1007/S11122-005-0022-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/Kabatiansky05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BargK05, author = {Alexander Barg and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg}, title = {Fingerprinting}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_166}, doi = {10.1007/0-387-23483-7\_166}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BargK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK05, author = {Robert Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg}, title = {Secret Sharing Schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_373}, doi = {10.1007/0-387-23483-7\_373}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK05a, author = {Robert Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg}, title = {Shamir's Threshold Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_389}, doi = {10.1007/0-387-23483-7\_389}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK05b, author = {Robert Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg}, title = {Share}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_391}, doi = {10.1007/0-387-23483-7\_391}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BlakleyK05c, author = {Robert Blakley and Gregory A. Kabatiansky}, editor = {Henk C. A. van Tilborg}, title = {Visual Secret Sharing Schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_456}, doi = {10.1007/0-387-23483-7\_456}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BlakleyK05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KabatianskyS05, author = {Gregory A. Kabatiansky and Ben J. M. Smeets}, editor = {Henk C. A. van Tilborg}, title = {Authentication}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_16}, doi = {10.1007/0-387-23483-7\_16}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KabatianskyS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/BargK04, author = {Alexander Barg and Gregory A. Kabatiansky}, title = {A class of {I.P.P.} codes with efficient identification}, journal = {J. Complex.}, volume = {20}, number = {2-3}, pages = {137--147}, year = {2004}, url = {https://doi.org/10.1016/j.jco.2003.08.012}, doi = {10.1016/J.JCO.2003.08.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/BargK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BlakleyK04, author = {G. R. Blakley and Gregory A. Kabatiansky}, title = {Random coding technique for digital fingerprinting codes: fighting two pirates revisited}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {203}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365239}, doi = {10.1109/ISIT.2004.1365239}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/BlakleyK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Kabatiansky04, author = {Gregory A. Kabatiansky}, title = {Good ternary 2-traceability codes exist}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {204}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365241}, doi = {10.1109/ISIT.2004.1365241}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Kabatiansky04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/cg/KabatianskyR04, author = {Gregory A. Kabatiansky and J. A. Rush}, editor = {Jacob E. Goodman and Joseph O'Rourke}, title = {Sphere packing and coding theory}, booktitle = {Handbook of Discrete and Computational Geometry, Second Edition}, pages = {1355--1376}, publisher = {Chapman and Hall/CRC}, year = {2004}, url = {https://doi.org/10.1201/9781420035315.ch61}, doi = {10.1201/9781420035315.CH61}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/cg/KabatianskyR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BargBK03, author = {Alexander Barg and G. R. Blakley and Gregory A. Kabatiansky}, title = {Digital fingerprinting codes: problem statements, constructions, identification of traitors}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {4}, pages = {852--865}, year = {2003}, url = {https://doi.org/10.1109/TIT.2003.809570}, doi = {10.1109/TIT.2003.809570}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BargBK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/GalandK03, author = {Fabien Galand and Grigory Kabatiansky}, title = {Information hiding by coverings}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {151--154}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216717}, doi = {10.1109/ITW.2003.1216717}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/GalandK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/BargCEKZ01, author = {Alexander Barg and G{\'{e}}rard D. Cohen and Sylvia B. Encheva and Grigory Kabatiansky and Gilles Z{\'{e}}mor}, title = {A hypergraph approach to the identifying parent property: the case of multiple parents}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {1--3}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00151-9}, doi = {10.1016/S1571-0653(04)00151-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/BargCEKZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/Kabatiansky01, author = {Gregory A. Kabatiansky}, title = {On Pair-Separating Codes}, journal = {Probl. Inf. Transm.}, volume = {37}, number = {4}, pages = {329--331}, year = {2001}, url = {https://doi.org/10.1023/A\%3A1013871300662}, doi = {10.1023/A\%3A1013871300662}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/Kabatiansky01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/BargCEKZ01, author = {Alexander Barg and G{\'{e}}rard D. Cohen and Sylvia B. Encheva and Gregory A. Kabatiansky and Gilles Z{\'{e}}mor}, title = {A Hypergraph Approach to the Identifying Parent Property: The Case of Multiple Parents}, journal = {{SIAM} J. Discret. Math.}, volume = {14}, number = {3}, pages = {423--431}, year = {2001}, url = {https://doi.org/10.1137/S0895480100376848}, doi = {10.1137/S0895480100376848}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/BargCEKZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KabatianskiiKS97, author = {Gregory Kabatianskii and E. A. Krouk and Ben J. M. Smeets}, editor = {Michael Darnell}, title = {A Digital Signature Scheme Based on Random Error-Correcting Codes}, booktitle = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester, UK, December 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1355}, pages = {161--167}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0024461}, doi = {10.1007/BFB0024461}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/KabatianskiiKS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KabatianskiiSJ96, author = {Gregory Kabatianskii and Ben J. M. Smeets and Thomas Johansson}, title = {On the cardinality of systematic authentication codes via error-correcting codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {2}, pages = {566--578}, year = {1996}, url = {https://doi.org/10.1109/18.485725}, doi = {10.1109/18.485725}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KabatianskiiSJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BurmesterDK96, author = {Mike Burmester and Yvo Desmedt and Gregory Kabatianskii}, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {Trust and security: {A} new look at the Byzantine generals problem}, booktitle = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, pages = {75--83}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/038/08}, doi = {10.1090/DIMACS/038/08}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BurmesterDK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlakleyK95, author = {G. R. Blakley and Gregory Kabatianskii}, editor = {Don Coppersmith}, title = {General Perfect Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {367--371}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_29}, doi = {10.1007/3-540-44750-4\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlakleyK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BierbrauerJKS93, author = {J{\"{u}}rgen Bierbrauer and Thomas Johansson and Gregory Kabatianskii and Ben J. M. Smeets}, editor = {Douglas R. Stinson}, title = {On Families of Hash Functions via Geometric Codes and Concatenation}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {331--342}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_28}, doi = {10.1007/3-540-48329-2\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BierbrauerJKS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccsp/BlakleyK93, author = {G. R. Blakley and Gregory Kabatianskii}, editor = {Andrew Chmora and Stephen B. Wicker}, title = {Linear Algebra Approach to Secret Sharing Schemes}, booktitle = {Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {829}, pages = {33--40}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58265-7\_5}, doi = {10.1007/3-540-58265-7\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/eccsp/BlakleyK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JohanssonKS93, author = {Thomas Johansson and Gregory Kabatianskii and Ben J. M. Smeets}, editor = {Tor Helleseth}, title = {On the Relation between A-Codes and Codes Correcting Independent Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {1--11}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_1}, doi = {10.1007/3-540-48285-7\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JohanssonKS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiwac/KabatianskiiL93, author = {Gregory Kabatianskii and Antoine Lobstein}, editor = {G{\'{e}}rard D. Cohen and Simon Litsyn and Antoine Lobstein and Gilles Z{\'{e}}mor}, title = {On Plotkin-Elias Type Bounds for Binary Arithmetic Codes}, booktitle = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {781}, pages = {263--269}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57843-9\_27}, doi = {10.1007/3-540-57843-9\_27}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fiwac/KabatianskiiL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.