BibTeX records: Gregory A. Kabatiansky

download as .bib file

@inproceedings{DBLP:conf/isncc/FernandezKKMR23,
  author       = {Marcel Fernandez and
                  Grigory Kabatiansky and
                  Ibrahim Kamel and
                  Ying Miao and
                  Tamer F. Rabie},
  title        = {Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial
                  Noise},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323965},
  doi          = {10.1109/ISNCC58260.2023.10323965},
  timestamp    = {Thu, 07 Dec 2023 20:38:52 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/FernandezKKMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/FernandezKMT23,
  author       = {Marcel Fernandez and
                  Grigory Kabatiansky and
                  Sebasti{\`{a}} Mart{\'{\i}}n and
                  C{\'{e}}dric Tavernier},
  title        = {A constructive approach to multimedia codes with complete traceability
                  resistant to {\(\delta\)}-noise},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France,
                  April 23-28, 2023},
  pages        = {254--259},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ITW55543.2023.10161685},
  doi          = {10.1109/ITW55543.2023.10161685},
  timestamp    = {Wed, 05 Jul 2023 16:00:01 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/FernandezKMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/EgorovaK21,
  author       = {Elena Egorova and
                  Gregory A. Kabatiansky},
  title        = {Separable Collusion-Secure Multimedia Codes},
  journal      = {Probl. Inf. Transm.},
  volume       = {57},
  number       = {2},
  pages        = {178--198},
  year         = {2021},
  url          = {https://doi.org/10.1134/S003294602102006X},
  doi          = {10.1134/S003294602102006X},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/EgorovaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EgorovaFK20,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Grigory Kabatiansky},
  title        = {On non-binary traceability set systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1885--1892},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00749-4},
  doi          = {10.1007/S10623-020-00749-4},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/EgorovaFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/EgorovaFKM20,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Gregory A. Kabatiansky and
                  Ying Miao},
  title        = {Existence and Construction of Complete Traceability Multimedia Fingerprinting
                  Codes Resistant to Averaging Attack and Adversarial Noise},
  journal      = {Probl. Inf. Transm.},
  volume       = {56},
  number       = {4},
  pages        = {388--398},
  year         = {2020},
  url          = {https://doi.org/10.1134/S0032946020040080},
  doi          = {10.1134/S0032946020040080},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/poit/EgorovaFKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbc/IvanovKKR20,
  author       = {Fedor I. Ivanov and
                  Grigory Kabatiansky and
                  Eugeniy Krouk and
                  Nikita Rumenko},
  editor       = {Marco Baldi and
                  Edoardo Persichetti and
                  Paolo Santini},
  title        = {A New Code-Based Cryptosystem},
  booktitle    = {Code-Based Cryptography - 8th International Workshop, CBCrypto 2020,
                  Zagreb, Croatia, May 9-10, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12087},
  pages        = {41--49},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54074-6\_3},
  doi          = {10.1007/978-3-030-54074-6\_3},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cbc/IvanovKKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KabatianskyE20,
  author       = {Grigory Kabatiansky and
                  Elena Egorova},
  title        = {Adversarial multiple access channels and a new model of multimedia
                  fingerprinting coding},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162248},
  doi          = {10.1109/CNS48642.2020.9162248},
  timestamp    = {Thu, 13 Aug 2020 14:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KabatianskyE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EgorovaFKL19,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Grigory Kabatiansky and
                  Moon Ho Lee},
  title        = {Signature codes for weighted noisy adder channel, multimedia fingerprinting
                  and compressed sensing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {455--462},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0551-9},
  doi          = {10.1007/S10623-018-0551-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EgorovaFKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/Kabatiansky19,
  author       = {Gregory A. Kabatiansky},
  title        = {Traceability Codes and Their Generalizations},
  journal      = {Probl. Inf. Transm.},
  volume       = {55},
  number       = {3},
  pages        = {283--294},
  year         = {2019},
  url          = {https://doi.org/10.1134/S0032946019030074},
  doi          = {10.1134/S0032946019030074},
  timestamp    = {Mon, 04 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/poit/Kabatiansky19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GuCKM19,
  author       = {Yujie Gu and
                  Minquan Cheng and
                  Grigory Kabatiansky and
                  Ying Miao},
  title        = {Probabilistic Existence Results for Parent-Identifying Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {10},
  pages        = {6160--6170},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2927020},
  doi          = {10.1109/TIT.2019.2927020},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GuCKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/Kabatiansky19,
  author       = {Grigory Kabatiansky},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley
                  - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {371--380},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_21},
  doi          = {10.1007/978-3-030-16458-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/Kabatiansky19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/EgorovaFK19,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Grigory Kabatiansky},
  title        = {A Construction of Traceability Set Systems with Polynomial Tracing
                  Algorithm},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {2739--2742},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849353},
  doi          = {10.1109/ISIT.2019.8849353},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/EgorovaFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-01031,
  author       = {Yujie Gu and
                  Minquan Cheng and
                  Grigory Kabatiansky and
                  Ying Miao},
  title        = {Probabilistic Existence Results for Parent-Identifying Schemes},
  journal      = {CoRR},
  volume       = {abs/1906.01031},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.01031},
  eprinttype    = {arXiv},
  eprint       = {1906.01031},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-01031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoreiraFK18,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fern{\'{a}}ndez and
                  Grigory Kabatiansky},
  title        = {Constructions of almost secure frameproof codes with applications
                  to fingerprinting schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {785--802},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0359-z},
  doi          = {10.1007/S10623-017-0359-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MoreiraFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/KabatianskyL18,
  author       = {Gregory A. Kabatiansky and
                  Vladimir S. Lebedev},
  title        = {On Metric Dimension of Nonbinary Hamming Spaces},
  journal      = {Probl. Inf. Transm.},
  volume       = {54},
  number       = {1},
  pages        = {48--55},
  year         = {2018},
  url          = {https://doi.org/10.1134/S0032946018010040},
  doi          = {10.1134/S0032946018010040},
  timestamp    = {Fri, 11 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/KabatianskyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GritsenkoKLM17,
  author       = {Vladimir Gritsenko and
                  Grigory Kabatiansky and
                  Vladimir S. Lebedev and
                  Alexey Maevskiy},
  title        = {Signature codes for noisy multiple access adder channel},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {293--299},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0228-1},
  doi          = {10.1007/S10623-016-0228-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GritsenkoKLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/KabatianskyL17,
  author       = {Grigory Kabatiansky and
                  Ivan N. Landjev},
  title        = {Preface},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {57},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.endm.2017.02.001},
  doi          = {10.1016/J.ENDM.2017.02.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/KabatianskyL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcta/EgorovaK17,
  author       = {Elena Egorova and
                  Grigory Kabatiansky},
  editor       = {{\'{A}}ngela I. Barbero and
                  Vitaly Skachek and
                  {\O}yvind Ytrehus},
  title        = {Analysis of Two Tracing Traitor Schemes via Coding Theory},
  booktitle    = {Coding Theory and Applications - 5th International Castle Meeting,
                  {ICMCTA} 2017, Vihula, Estonia, August 28-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10495},
  pages        = {84--92},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66278-7\_8},
  doi          = {10.1007/978-3-319-66278-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcta/EgorovaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoreiraFK16,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fern{\'{a}}ndez and
                  Grigory Kabatiansky},
  title        = {Almost separating and almost secure frameproof codes over q-ary alphabets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {11--28},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0060-z},
  doi          = {10.1007/S10623-015-0060-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MoreiraFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/EgorovaFKL16,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Grigory A. Kabatiansky and
                  Moon Ho Lee},
  title        = {Signature codes for the A-channel and collusion-secure multimedia
                  fingerprinting codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {3043--3047},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541858},
  doi          = {10.1109/ISIT.2016.7541858},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/EgorovaFKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KabatianskyFE16,
  author       = {Grigory Kabatiansky and
                  Marcel Fernandez and
                  Elena Egorova},
  title        = {Multimedia fingerprinting codes resistant against colluders and noise},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823904},
  doi          = {10.1109/WIFS.2016.7823904},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KabatianskyFE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/VladutKL15,
  author       = {Serge G. Vladut and
                  Gregory A. Kabatiansky and
                  V. V. Lomakov},
  title        = {On error correction with errors in both the channel and syndrome},
  journal      = {Probl. Inf. Transm.},
  volume       = {51},
  number       = {2},
  pages        = {132--138},
  year         = {2015},
  url          = {https://doi.org/10.1134/S0032946015020040},
  doi          = {10.1134/S0032946015020040},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/VladutKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KabatianskyVT15,
  author       = {Grigory Kabatiansky and
                  Serge G. Vladut and
                  C{\'{e}}dric Tavernier},
  editor       = {Jens Groth},
  title        = {On the Doubly Sparse Compressed Sensing Problem},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {184--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_11},
  doi          = {10.1007/978-3-319-27239-9\_11},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KabatianskyVT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/FernandezKM15,
  author       = {Marcel Fernandez and
                  Grigory Kabatiansky and
                  Jos{\'{e}} Moreira},
  title        = {Almost IPP-codes or provably secure digital fingerprinting codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {1595--1599},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282725},
  doi          = {10.1109/ISIT.2015.7282725},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/FernandezKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FernandezEK15,
  author       = {Marcel Fernandez and
                  Elena Egorova and
                  Grigory Kabatiansky},
  title        = {Binary fingerprinting codes - can we prove that someone is guilty?!},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368558},
  doi          = {10.1109/WIFS.2015.7368558},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FernandezEK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KabatianskyTV15,
  author       = {Grigory Kabatiansky and
                  C{\'{e}}dric Tavernier and
                  Serge G. Vladut},
  title        = {On the Doubly Sparse Compressed Sensing Problem},
  journal      = {CoRR},
  volume       = {abs/1509.07145},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.07145},
  eprinttype    = {arXiv},
  eprint       = {1509.07145},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KabatianskyTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BargK13,
  author       = {Alexander Barg and
                  Grigory Kabatiansky},
  title        = {Robust Parent-Identifying Codes and Combinatorial Arrays},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {59},
  number       = {2},
  pages        = {994--1003},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIT.2012.2220522},
  doi          = {10.1109/TIT.2012.2220522},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BargK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MoreiraFK13,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Grigory Kabatiansky},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Constructions of Almost Secure Frameproof Codes Based on Small-Bias
                  Probability Spaces},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_4},
  doi          = {10.1007/978-3-642-41383-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MoreiraFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BargK11,
  author       = {Alexander Barg and
                  Grigory Kabatiansky},
  editor       = {Serge Fehr},
  title        = {Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption
                  - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {202--205},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_18},
  doi          = {10.1007/978-3-642-20728-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BargK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DumerKT11,
  author       = {Ilya Dumer and
                  Grigory Kabatiansky and
                  C{\'{e}}dric Tavernier},
  editor       = {Alexander Kuleshov and
                  Vladimir M. Blinovsky and
                  Anthony Ephremides},
  title        = {Soft-decision list decoding of Reed-Muller codes with linear complexity},
  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,
                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  pages        = {2303--2307},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIT.2011.6033973},
  doi          = {10.1109/ISIT.2011.6033973},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DumerKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/FernandezKM11,
  author       = {Marcel Fernandez and
                  Grigory Kabatiansky and
                  Jos{\'{e}} Moreira},
  editor       = {Alexander Kuleshov and
                  Vladimir M. Blinovsky and
                  Anthony Ephremides},
  title        = {Almost separating and almost secure frameproof codes},
  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,
                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  pages        = {2696--2700},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIT.2011.6034061},
  doi          = {10.1109/ISIT.2011.6034061},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/FernandezKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoreiraKF11,
  author       = {Jos{\'{e}} Moreira and
                  Grigory Kabatiansky and
                  Marcel Fernandez},
  title        = {Lower bounds on almost-separating binary codes},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123141},
  doi          = {10.1109/WIFS.2011.6123141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MoreiraKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KabatianskyS11,
  author       = {Gregory A. Kabatiansky and
                  Ben J. M. Smeets},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Authentication, From an Information Theoretic Perspective},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {63--65},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_377},
  doi          = {10.1007/978-1-4419-5906-5\_377},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KabatianskyS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BargK11,
  author       = {Alexander Barg and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Fingerprinting},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {465--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_381},
  doi          = {10.1007/978-1-4419-5906-5\_381},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BargK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK11,
  author       = {G. R. Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Secret Sharing Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1095--1097},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_389},
  doi          = {10.1007/978-1-4419-5906-5\_389},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK11a,
  author       = {G. R. Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Shamir's Threshold Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1193--1194},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_390},
  doi          = {10.1007/978-1-4419-5906-5\_390},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK11b,
  author       = {G. R. Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Share},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1195--1196},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_391},
  doi          = {10.1007/978-1-4419-5906-5\_391},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK11c,
  author       = {G. R. Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Visual Secret Sharing Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1363--1364},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_393},
  doi          = {10.1007/978-1-4419-5906-5\_393},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BargK11,
  author       = {Alexander Barg and
                  Grigory Kabatiansky},
  title        = {Robust parent-identifying codes and combinatorial arrays},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BargK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/BargBKT10,
  author       = {Alexander Barg and
                  G. Robert Blakley and
                  Grigory Kabatiansky and
                  C{\'{e}}dric Tavernier},
  editor       = {Marcus Greferath and
                  Joachim Rosenthal and
                  Alexander Barg and
                  Gilles Z{\'{e}}mor},
  title        = {Robust parent-identifying codes},
  booktitle    = {2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland,
                  August 30 - September 3, 2010},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIG.2010.5592920},
  doi          = {10.1109/CIG.2010.5592920},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/BargBKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/GalandK09,
  author       = {Fabien Galand and
                  Gregory A. Kabatiansky},
  title        = {Coverings, centered codes, and combinatorial steganography},
  journal      = {Probl. Inf. Transm.},
  volume       = {45},
  number       = {3},
  pages        = {289},
  year         = {2009},
  url          = {https://doi.org/10.1134/S0032946009030107},
  doi          = {10.1134/S0032946009030107},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/GalandK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0909-1051,
  author       = {Gregory A. Kabatiansky and
                  G. Oshanin},
  title        = {Finding passwords by random walks: How long does it take?},
  journal      = {CoRR},
  volume       = {abs/0909.1051},
  year         = {2009},
  url          = {http://arxiv.org/abs/0909.1051},
  eprinttype    = {arXiv},
  eprint       = {0909.1051},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0909-1051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DumerKT08,
  author       = {Ilya Dumer and
                  Gregory A. Kabatiansky and
                  C{\'{e}}dric Tavernier},
  title        = {List Decoding of Biorthogonal Codes and the Hadamard Transform With
                  Linear Complexity},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {10},
  pages        = {4488--4492},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.929014},
  doi          = {10.1109/TIT.2008.929014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DumerKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/DumerKT07,
  author       = {Ilya Dumer and
                  Gregory A. Kabatiansky and
                  C{\'{e}}dric Tavernier},
  title        = {List decoding of the first-order binary Reed-Muller codes},
  journal      = {Probl. Inf. Transm.},
  volume       = {43},
  number       = {3},
  pages        = {225--232},
  year         = {2007},
  url          = {https://doi.org/10.1134/S0032946007030052},
  doi          = {10.1134/S0032946007030052},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/DumerKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DumerKT07,
  author       = {Ilya Dumer and
                  Grigory Kabatiansky and
                  C{\'{e}}dric Tavernier},
  title        = {Soft-Decision List Decoding with Linear Complexity for the First-Order
                  Reed-Muller Codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {1346--1349},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557410},
  doi          = {10.1109/ISIT.2007.4557410},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DumerKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DumerKT06,
  author       = {Ilya Dumer and
                  Grigory Kabatiansky and
                  C{\'{e}}dric Tavernier},
  title        = {List decoding of Reed-Muller codes up to the Johnson bound with almost
                  linear complexity},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {138--142},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261690},
  doi          = {10.1109/ISIT.2006.261690},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DumerKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/Kabatiansky05,
  author       = {Gregory A. Kabatiansky},
  title        = {Codes for Copyright Protection: The Case of Two Pirates},
  journal      = {Probl. Inf. Transm.},
  volume       = {41},
  number       = {2},
  pages        = {182--186},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11122-005-0022-6},
  doi          = {10.1007/S11122-005-0022-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/Kabatiansky05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BargK05,
  author       = {Alexander Barg and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg},
  title        = {Fingerprinting},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_166},
  doi          = {10.1007/0-387-23483-7\_166},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BargK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK05,
  author       = {Robert Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg},
  title        = {Secret Sharing Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_373},
  doi          = {10.1007/0-387-23483-7\_373},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK05a,
  author       = {Robert Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg},
  title        = {Shamir's Threshold Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_389},
  doi          = {10.1007/0-387-23483-7\_389},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK05b,
  author       = {Robert Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg},
  title        = {Share},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_391},
  doi          = {10.1007/0-387-23483-7\_391},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BlakleyK05c,
  author       = {Robert Blakley and
                  Gregory A. Kabatiansky},
  editor       = {Henk C. A. van Tilborg},
  title        = {Visual Secret Sharing Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_456},
  doi          = {10.1007/0-387-23483-7\_456},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BlakleyK05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KabatianskyS05,
  author       = {Gregory A. Kabatiansky and
                  Ben J. M. Smeets},
  editor       = {Henk C. A. van Tilborg},
  title        = {Authentication},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_16},
  doi          = {10.1007/0-387-23483-7\_16},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KabatianskyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/BargK04,
  author       = {Alexander Barg and
                  Gregory A. Kabatiansky},
  title        = {A class of {I.P.P.} codes with efficient identification},
  journal      = {J. Complex.},
  volume       = {20},
  number       = {2-3},
  pages        = {137--147},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jco.2003.08.012},
  doi          = {10.1016/J.JCO.2003.08.012},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/BargK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BlakleyK04,
  author       = {G. R. Blakley and
                  Gregory A. Kabatiansky},
  title        = {Random coding technique for digital fingerprinting codes: fighting
                  two pirates revisited},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {203},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365239},
  doi          = {10.1109/ISIT.2004.1365239},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BlakleyK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Kabatiansky04,
  author       = {Gregory A. Kabatiansky},
  title        = {Good ternary 2-traceability codes exist},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {204},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365241},
  doi          = {10.1109/ISIT.2004.1365241},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/Kabatiansky04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/cg/KabatianskyR04,
  author       = {Gregory A. Kabatiansky and
                  J. A. Rush},
  editor       = {Jacob E. Goodman and
                  Joseph O'Rourke},
  title        = {Sphere packing and coding theory},
  booktitle    = {Handbook of Discrete and Computational Geometry, Second Edition},
  pages        = {1355--1376},
  publisher    = {Chapman and Hall/CRC},
  year         = {2004},
  url          = {https://doi.org/10.1201/9781420035315.ch61},
  doi          = {10.1201/9781420035315.CH61},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/cg/KabatianskyR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BargBK03,
  author       = {Alexander Barg and
                  G. R. Blakley and
                  Gregory A. Kabatiansky},
  title        = {Digital fingerprinting codes: problem statements, constructions, identification
                  of traitors},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {4},
  pages        = {852--865},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2003.809570},
  doi          = {10.1109/TIT.2003.809570},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BargBK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/GalandK03,
  author       = {Fabien Galand and
                  Grigory Kabatiansky},
  title        = {Information hiding by coverings},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {151--154},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216717},
  doi          = {10.1109/ITW.2003.1216717},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/GalandK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/BargCEKZ01,
  author       = {Alexander Barg and
                  G{\'{e}}rard D. Cohen and
                  Sylvia B. Encheva and
                  Grigory Kabatiansky and
                  Gilles Z{\'{e}}mor},
  title        = {A hypergraph approach to the identifying parent property: the case
                  of multiple parents},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {1--3},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00151-9},
  doi          = {10.1016/S1571-0653(04)00151-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/BargCEKZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/Kabatiansky01,
  author       = {Gregory A. Kabatiansky},
  title        = {On Pair-Separating Codes},
  journal      = {Probl. Inf. Transm.},
  volume       = {37},
  number       = {4},
  pages        = {329--331},
  year         = {2001},
  url          = {https://doi.org/10.1023/A\%3A1013871300662},
  doi          = {10.1023/A\%3A1013871300662},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/Kabatiansky01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/BargCEKZ01,
  author       = {Alexander Barg and
                  G{\'{e}}rard D. Cohen and
                  Sylvia B. Encheva and
                  Gregory A. Kabatiansky and
                  Gilles Z{\'{e}}mor},
  title        = {A Hypergraph Approach to the Identifying Parent Property: The Case
                  of Multiple Parents},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {14},
  number       = {3},
  pages        = {423--431},
  year         = {2001},
  url          = {https://doi.org/10.1137/S0895480100376848},
  doi          = {10.1137/S0895480100376848},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/BargCEKZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KabatianskiiKS97,
  author       = {Gregory Kabatianskii and
                  E. A. Krouk and
                  Ben J. M. Smeets},
  editor       = {Michael Darnell},
  title        = {A Digital Signature Scheme Based on Random Error-Correcting Codes},
  booktitle    = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1355},
  pages        = {161--167},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0024461},
  doi          = {10.1007/BFB0024461},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KabatianskiiKS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KabatianskiiSJ96,
  author       = {Gregory Kabatianskii and
                  Ben J. M. Smeets and
                  Thomas Johansson},
  title        = {On the cardinality of systematic authentication codes via error-correcting
                  codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {2},
  pages        = {566--578},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.485725},
  doi          = {10.1109/18.485725},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KabatianskiiSJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BurmesterDK96,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Gregory Kabatianskii},
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {Trust and security: {A} new look at the Byzantine generals problem},
  booktitle    = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  pages        = {75--83},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/038/08},
  doi          = {10.1090/DIMACS/038/08},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BurmesterDK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlakleyK95,
  author       = {G. R. Blakley and
                  Gregory Kabatianskii},
  editor       = {Don Coppersmith},
  title        = {General Perfect Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {367--371},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_29},
  doi          = {10.1007/3-540-44750-4\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlakleyK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BierbrauerJKS93,
  author       = {J{\"{u}}rgen Bierbrauer and
                  Thomas Johansson and
                  Gregory Kabatianskii and
                  Ben J. M. Smeets},
  editor       = {Douglas R. Stinson},
  title        = {On Families of Hash Functions via Geometric Codes and Concatenation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {331--342},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_28},
  doi          = {10.1007/3-540-48329-2\_28},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BierbrauerJKS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccsp/BlakleyK93,
  author       = {G. R. Blakley and
                  Gregory Kabatianskii},
  editor       = {Andrew Chmora and
                  Stephen B. Wicker},
  title        = {Linear Algebra Approach to Secret Sharing Schemes},
  booktitle    = {Error Control, Cryptology, and Speech Compression - Workshop on Information
                  Protection, Moscow, Russia, December 6-9, 1993, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {829},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58265-7\_5},
  doi          = {10.1007/3-540-58265-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/eccsp/BlakleyK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JohanssonKS93,
  author       = {Thomas Johansson and
                  Gregory Kabatianskii and
                  Ben J. M. Smeets},
  editor       = {Tor Helleseth},
  title        = {On the Relation between A-Codes and Codes Correcting Independent Errors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_1},
  doi          = {10.1007/3-540-48285-7\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JohanssonKS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiwac/KabatianskiiL93,
  author       = {Gregory Kabatianskii and
                  Antoine Lobstein},
  editor       = {G{\'{e}}rard D. Cohen and
                  Simon Litsyn and
                  Antoine Lobstein and
                  Gilles Z{\'{e}}mor},
  title        = {On Plotkin-Elias Type Bounds for Binary Arithmetic Codes},
  booktitle    = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July
                  19-21, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {781},
  pages        = {263--269},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57843-9\_27},
  doi          = {10.1007/3-540-57843-9\_27},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fiwac/KabatianskiiL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics