-
1
-
-
0020721991
-
-
vol. IT-29, pp. 208-210, 1983.
-
A. Asmuth and J. Bloom, "A modular approach to key safeguarding," IEEE Trans. Information Theory, vol. IT-29, pp. 208-210, 1983.
-
"A Modular Approach to Key Safeguarding," IEEE Trans. Information Theory
-
-
Asmuth, A.1
Bloom, J.2
-
2
-
-
85027180622
-
-
vol. 48, pp. 242-268, 1979.
-
G. R. Blakley, "Safeguarding cryptographic keys," Proc. the National Computer Conference, 1979, American Federation of Information Processing Societies, vol. 48, pp. 242-268, 1979.
-
"Safeguarding Cryptographic Keys," Proc. the National Computer Conference, 1979, American Federation of Information Processing Societies
-
-
Blakley, G.R.1
-
3
-
-
0002579993
-
-
in Advances in Cryptology-Crypto '84, pp. 242268, Springer-Verlag, Berlin, Heidelberg, 1984.
-
G. R. Blakley and C. Meadows, "Security of ramp schemes," in Advances in Cryptology-Crypto '84, pp. 242268, Springer-Verlag, Berlin, Heidelberg, 1984.
-
"Security of Ramp Schemes,"
-
-
Blakley, G.R.1
Meadows, C.2
-
4
-
-
84948003090
-
-
IEEE International Phoenix Conference on Computer and Communications (Wyndham Paradise Vally Resort Scottsdale Arizona, U.S.A.), pp. 3.4.4.1-3.4.4.4, April 1-3, 1992.
-
C. C. Chang and S. J. Hwang, "Sharing a dynamic secret," IEEE International Phoenix Conference on Computer and Communications (Wyndham Paradise Vally Resort Scottsdale Arizona, U.S.A.), pp. 3.4.4.1-3.4.4.4, April 1-3, 1992.
-
"Sharing a Dynamic Secret,"
-
-
Chang, C.C.1
Hwang, S.J.2
-
5
-
-
0017018484
-
-
vol. IT-22, no. 6, pp. 644-654, 1976.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
-
"New Directions in Cryptography," IEEE Trans. Information Theory
-
-
Diffie, W.1
Hellman, M.E.2
-
6
-
-
84874800178
-
-
vol. IT-31, no. 4, pp. 469-472, July 1985.
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Information Theory, vol. IT-31, no. 4, pp. 469-472, July 1985.
-
"A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory
-
-
Elgamal, T.1
-
7
-
-
0028498073
-
-
J. He and E. Dawson, "Multistage secret sharing based on one-way function," Electronics Letters, vol. 30, no. 19, pp. 1591-1592, Sept. 1994.
-
"Multistage Secret Sharing Based on One-way Function," Electronics Letters, Vol. 30, No. 19, Pp. 1591-1592, Sept. 1994.
-
-
He, J.1
Dawson, E.2
-
8
-
-
84934275826
-
-
Electronics Letters, vol. 30, no. 15, p. 1212, 1994.
-
P. Horster, M. Michels, and H. Petersen, "Authenticated encryption schemes with low communication costs," Electronics Letters, vol. 30, no. 15, p. 1212, 1994.
-
"Authenticated Encryption Schemes with Low Communication Costs,"
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
9
-
-
0020543282
-
-
vol. IT-29, pp. 35-41, 1983.
-
E. D. Karnin, J. W. Greene, and H. E. Hellman, "On secret sharing systems," IEEE Trans. Information Theory, vol. IT-29, pp. 35-41, 1983.
-
"On Secret Sharing Systems," IEEE Trans. Information Theory
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, H.E.3
-
10
-
-
0003657590
-
-
D. Knuth, "The Art of Computer Programming, Vol. 2 : Seminumerical Algorithms," Second Edition, AddisonWesley, Reading, Mass, 1981.
-
"The Art of Computer Programming, Vol. 2 : Seminumerical Algorithms," Second Edition, AddisonWesley, Reading, Mass, 1981.
-
-
Knuth, D.1
-
11
-
-
85027094591
-
-
C. Laih, L. Harn, J. Lee, and T. Hwang, "Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space," Proc. Crypto '89, Santa Barbara, California, U.S.A., pp. 20-24, Aug. 1989.
-
"Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-dimensional Linear Space," Proc. Crypto '89, Santa Barbara, California, U.S.A., Pp. 20-24, Aug. 1989.
-
-
Laih, C.1
Harn, L.2
Lee, J.3
Hwang, T.4
-
12
-
-
84947597805
-
-
U. M. Maurer, "Towards the equivalence of breaking the diffie-hellman protocol and computing discrete Logarithm," Proc. of Crypto '94 (Santa Barbara, California, U.S.A.), pp. 271-281, 1994.
-
"Towards the Equivalence of Breaking the Diffie-hellman Protocol and Computing Discrete Logarithm," Proc. of Crypto '94 (Santa Barbara, California, U.S.A.), Pp. 271-281, 1994.
-
-
Maurer, U.M.1
-
13
-
-
0004129394
-
-
Kluwer Acadmeic Publishers, Boston, pp. 115-131, 1993.
-
A. J. Menexes, ed., "Applications of Finite Fields," Kluwer Acadmeic Publishers, Boston, pp. 115-131, 1993.
-
"Applications of Finite Fields,"
-
-
Menexes, A.J.1
-
14
-
-
85027137061
-
-
C. P. Schnorr, "Efficient identification and signatures for smart cards," in Advances in Cryptology : Crypto '89, Springer Verlag, New York, pp. 239-252, 1990.
-
"Efficient Identification and Signatures for Smart Cards," in Advances in Cryptology : Crypto '89, Springer Verlag, New York, Pp. 239-252, 1990.
-
-
Schnorr, C.P.1
-
15
-
-
0018545449
-
-
vol. 22, no. 11, pp. 612-613, 1979.
-
A. Shamir, "How to share a secret," Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, 1979.
-
"How to Share a Secret," Communications of the Association for Computing Machinery
-
-
Shamir, A.1
-
16
-
-
84948003092
-
-
Master Thesis of Institute of Applied Mathematics, National Cheng Kung University, Tainan, Taiwan, R.O.C., pp. 36-67, 1990.
-
H. M. Sun, "Key management on public-key cryptosystems and threshold schemes," Master Thesis of Institute of Applied Mathematics, National Cheng Kung University, Tainan, Taiwan, R.O.C., pp. 36-67, 1990.
-
"Key Management on Public-key Cryptosystems and Threshold Schemes,"
-
-
Sun, H.M.1
-
17
-
-
84935531957
-
-
Electronics Letters, vol. 24, no. 3, pp. 154-156, 1988.
-
Y. Y. Xain, "Relationship between MDS codes and threshold scheme," Electronics Letters, vol. 24, no. 3, pp. 154-156, 1988.
-
"Relationship between MDS Codes and Threshold Scheme,"
-
-
Xain, Y.Y.1
|