-
2
-
-
0000525949
-
Some recursive constructions for perfect hash families
-
M. Atici, S. S. Magliveras, D. R. Stinson and W.-D. W̃ei, Some recursive constructions for perfect hash families, Journal of Combinatorial Designs, Vol. 4 (1996) pp. 353-363.
-
(1996)
Journal of Combinatorial Designs
, vol.4
, pp. 353-363
-
-
Atici, M.1
Magliveras, S.S.2
Stinson, D.R.3
W̃ei, W.-D.4
-
3
-
-
0005944705
-
Interaction in key distribution schemes
-
Advances in Cryptology: CRYPTO '93
-
A. Beimel and B. Chor, Interaction in key distribution schemes, Advances in Cryptology: CRYPTO '93, Lecture Notes in Computer Science, 773 (1994) pp. 444-455.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 444-455
-
-
Beimel, A.1
Chor, B.2
-
7
-
-
85030481487
-
How to broadcast a secret
-
Advances in Cryptology: EUROCRYPT '91
-
S. Berkovits, How to broadcast a secret, Advances in Cryptology: EUROCRYPT '91, Lecture Notes in Computer Science, 547 (1992) pp. 536-541.
-
(1992)
Lecture Notes in Computer Science
, vol.547
, pp. 536-541
-
-
Berkovits, S.1
-
9
-
-
84996557101
-
Bounds for resilient functions and orthogonal arrays
-
Advances in Cryptology: EUROCRYPT '91
-
J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Bounds for resilient functions and orthogonal arrays, Advances in Cryptology: CRYPTO '94, Lecture Notes in Computer Science, 839 (1994) pp. 247-256.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 247-256
-
-
Bierbrauer, J.1
Gopalakrishnan, K.2
Stinson, D.R.3
-
10
-
-
0030365320
-
Orthogonal arrays, resilient functions, error-correcting codes and linear programming bounds
-
J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Orthogonal arrays, resilient functions, error-correcting codes and linear programming bounds, SIAM J. Discrete Math, Vol. 9 (1996) pp. 424-452.
-
(1996)
SIAM J. Discrete Math
, vol.9
, pp. 424-452
-
-
Bierbrauer, J.1
Gopalakrishnan, K.2
Stinson, D.R.3
-
11
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology: EUROCRYPT '84
-
R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: EUROCRYPT '84, Lecture Notes in Computer Science, 209 (1985) pp. 335-338.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
12
-
-
84948984838
-
Space requirements for broadcast encryption
-
Advances in Cryptology: EUROCRYPT '94
-
C. Blundo and A. Cresti, Space requirements for broadcast encryption, Advances in Cryptology: EUROCRYPT '94, Lecture Notes in Computer Science, 950 (1995) pp. 287-298.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
13
-
-
85028765277
-
Perfectly secure key distribution for dynamic conferences
-
Advances in Cryptology: EUROCRYPT '94
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly secure key distribution for dynamic conferences, Advances in Cryptology: CRYPTO '92, Lecture Notes in Computer Science, 740 (1993) pp. 471-486.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
14
-
-
85027395928
-
Randomness in distribution protocols
-
Automata, Languages and Programming: ICALP '94
-
C. Blundo, A. De Santis and U. Vaccaro, Randomness in distribution protocols, Automata, Languages and Programming: ICALP '94, Lecture Notes in Computer Science, 820 (1994) pp. 568-579.
-
(1994)
Lecture Notes in Computer Science
, vol.820
, pp. 568-579
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
15
-
-
84955614214
-
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
-
Advances in Cryptology: CRYPTO '96
-
C. Blundo, L. A. Frota Mattos and D. R. Stinson, Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution, Advances in Cryptology: CRYPTO '96, Lecture Notes in Computer Science, 1109 (1996) pp. 387-400.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 387-400
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
16
-
-
0028678378
-
Multiple key distribution maintaining user anonymity via broadcast channels
-
C. Blundo, L. A. Frota Mattos and D. R. Stinson, Multiple key distribution maintaining user anonymity via broadcast channels, J. Computer Security, Vol. 3 (1994/95) pp. 309-323.
-
(1994)
J. Computer Security
, vol.3
, pp. 309-323
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
18
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, Journal of Cryptology, Vol. 4 (1991) pp. 123-134.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
20
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich and R. Smolensky, The bit extraction problem or t-resilient functions, Proc. 26th IEEE Symposium on Foundations of Computer Science (1985) pp. 396-407.
-
(1985)
Proc. 26th IEEE Symposium on Foundations of Computer Science
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
21
-
-
0029362456
-
On key storage in secure networks
-
M. Dyer, T. Fenner, A. Frieze and A. Thomason, On key storage in secure networks, Journal of Cryptology, Vol. 8 (1995) pp. 189-200.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
22
-
-
84979291225
-
Broadcast encryption
-
Advances in Cryptology: CRYPTO '93
-
A. Fiat and M. Naor, Broadcast encryption, Advances in Cryptology: CRYPTO '93, Lecture Notes in Computer Science, 773 (1994) pp. 480-491.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
23
-
-
0002302934
-
On the size of separating systems and families of perfect hash functions
-
M. L. Fredman and J. Komlos, On the size of separating systems and families of perfect hash functions, SIAM Journal of Algebraic and Discrete Methods, Vol. 5 (1984) pp. 61-68.
-
(1984)
SIAM Journal of Algebraic and Discrete Methods
, vol.5
, pp. 61-68
-
-
Fredman, M.L.1
Komlos, J.2
-
25
-
-
0025212474
-
A matrix key-distribution scheme
-
L. Gong and D. L. Wheeler, A matrix key-distribution scheme, Journal of Cryptology, Vol. 2 (1990) pp. 51-59.
-
(1990)
Journal of Cryptology
, vol.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.L.2
-
27
-
-
0005275186
-
Three characterizations of non-binary correlation-immune and resilient functions
-
K. Gopalakrishnan and D. R. Stinson, Three characterizations of non-binary correlation-immune and resilient functions, Designs, Codes and Cryptography, Vol. 5 (1995) pp. 241-251.
-
(1995)
Designs, Codes and Cryptography
, vol.5
, pp. 241-251
-
-
Gopalakrishnan, K.1
Stinson, D.R.2
-
28
-
-
0343017090
-
On key distribution via true broadcasting
-
M. Just, E. Kranakis, D. Krizanc and P. van Oorschot, On key distribution via true broadcasting, Proc. 2nd ACM Conf. on Computer and Communications Security, pp. 81-88.
-
Proc. 2nd ACM Conf. on Computer and Communications Security
, pp. 81-88
-
-
Just, M.1
Kranakis, E.2
Krizanc, D.3
Van Oorschot, P.4
-
29
-
-
1842657781
-
A broadcast key distribution scheme based on block designs
-
Cryptography and Coding, V
-
V Korjik, M. Ivkov, Y. Merinovitch, A. Barg and H. van Tilborg, A broadcast key distribution scheme based on block designs, Cryptography and Coding, V, Lecture Notes in Computer Science, 1025 (1995) pp. 12-21.
-
(1995)
Lecture Notes in Computer Science
, vol.1025
, pp. 12-21
-
-
Korjik, V.1
Ivkov, M.2
Merinovitch, Y.3
Barg, A.4
Van Tilborg, H.5
-
30
-
-
84955574846
-
Security of the center in key distribution schemes
-
Advances in Cryptology: ASIACRYPT '94
-
K. Kurosawa, K. Okada and K. Sakano, Security of the center in key distribution schemes, Advances in Cryptology: ASIACRYPT '94, Lecture Notes in Computer Science, 917 (1995).
-
(1995)
Lecture Notes in Computer Science
, vol.917
-
-
Kurosawa, K.1
Okada, K.2
Sakano, K.3
-
31
-
-
84949023663
-
Secret-key agreement without public-key cryptography
-
Advances in Cryptology: CRYPTO '93
-
T. Leighton and S. Micali, Secret-key agreement without public-key cryptography, Advances in Cryptology: CRYPTO '93, Lecture Notes in Computer Science, 773 (1994) pp. 456-479.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
32
-
-
0002874527
-
Incidence structures for key sharing
-
Advances in Cryptology: ASIACRYPT '94
-
T. Matsumoto, Incidence structures for key sharing, Advances in Cryptology: ASIACRYPT '94, Lecture Notes in Computer Science, 917 (1995) pp. 342-353.
-
(1995)
Lecture Notes in Computer Science
, vol.917
, pp. 342-353
-
-
Matsumoto, T.1
-
35
-
-
1842808765
-
Applications of finite geometries to information security
-
C. M. O'Keefe, Applications of finite geometries to information security, Australasian J. Combinatorics, Vol. 7 (1993) pp. 195-212.
-
(1993)
Australasian J. Combinatorics
, vol.7
, pp. 195-212
-
-
O'Keefe, C.M.1
-
36
-
-
0002724154
-
Some constructions for key distribution patterns
-
K. A. S. Quinn, Some constructions for key distribution patterns, Designs, Codes and Cryptography, Vol. 4 (1994) pp. 177-191.
-
(1994)
Designs, Codes and Cryptography
, vol.4
, pp. 177-191
-
-
Quinn, K.A.S.1
-
37
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM, Vol. 22 (1979) pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
38
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357-390.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
|