-
1
-
-
0003415652
-
-
Addison-Wesley, Mass.
-
AHO, A.V., HOPCROFT, J.E., and ULLMAN, J.D.: 'The design and analysis of computer algorithms' (Addison-Wesley, Mass., 1974)
-
(1974)
The Design and Analysis of Computer Algorithms
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
2
-
-
0001318089
-
Safeguarding cryptographic keys
-
American Federation of Information Processing Societies
-
BLAKLEY, G.R.: 'Safeguarding cryptographic keys'. Proceedings of the national computer conference, 1979, American Federation of Information Processing Societies, 1979, Vol. 48, pp. 242-268
-
(1979)
Proceedings of the National Computer Conference, 1979
, vol.48
, pp. 242-268
-
-
Blakley, G.R.1
-
3
-
-
0010475265
-
The detection of cheaters in threshold schemes
-
Springer-Verlag, Berlin, Heidelberg
-
BRICKELL, E.F., and STINTON, D.R.: The detection of cheaters in threshold schemes' in 'Advances in cryptology- Crypto '88' (Springer-Verlag, Berlin, Heidelberg, 1988), pp. 2017-2018
-
(1988)
Advances in Cryptology- Crypto '88'
, pp. 2017-2018
-
-
Brickell, E.F.1
Stinton, D.R.2
-
4
-
-
0028549976
-
Iterative modular multiplication algorithm without magnitude comparison
-
CHIOU, C.W., and YANG, T.C.: 'Iterative modular multiplication algorithm without magnitude comparison', Electron. Lett., 1994, 30, (24), pp. 2017-2018
-
(1994)
Electron. Lett.
, vol.30
, Issue.24
, pp. 2017-2018
-
-
Chiou, C.W.1
Yang, T.C.2
-
6
-
-
0019573099
-
A database encryption system with subkeys
-
DAVIDA, G.I., WELLS, D.L., and KAM, J.B.: 'A database encryption system with subkeys', ACM Trans. Database Syst., 1981, 6, (2), pp. 312-328
-
(1981)
ACM Trans. Database Syst.
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
8
-
-
0345524279
-
New cheater identification in threshold schemes
-
National Chiao Tung University, Hsinchu, Taiwan, Republic of China
-
HWANG, S.J., CHANG, CC., and YANG, W.P.: 'New cheater identification in threshold schemes'. Technical report of the Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China, 1995
-
(1995)
Technical Report of the Institute of Computer and Information Science
-
-
Hwang, S.J.1
Chang, C.C.2
Yang, W.P.3
-
9
-
-
0038061940
-
Password authentication using quadratic residues
-
Taiwan, ROC
-
LAIH, C.S., HARN, L., and HUANG, D.: 'Password authentication using quadratic residues',Proceedings of the international computer symposium, Taiwan, ROC, 1988, pp. 1484-1489
-
(1988)
Proceedings of the International Computer Symposium
, pp. 1484-1489
-
-
Laih, C.S.1
Harn, L.2
Huang, D.3
-
10
-
-
0345121671
-
Digitized signatures and public-key functions as intractable as factorization
-
MIT Laboratory for Computer Science, Cambridge, MA
-
RABIN, M.O.: 'Digitized signatures and public-key functions as intractable as factorization'. Technical report LCS/TR-212, MIT Laboratory for Computer Science, Cambridge, MA, 1979
-
(1979)
Technical Report LCS/TR-212
-
-
Rabin, M.O.1
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
RIVEST, R.L., SHAMIR, A., and ADLEMAN, L.: 'A method for obtaining digital signatures and public key cryptosystems', Commun. ACM, 1978, 21, (2), pp. 120-126
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
12
-
-
0018545449
-
How to share a secret
-
SHAMIR, A.: 'How to share a secret', Commun. ACM, 1979, 22, (11), pp. 612-613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
0028548565
-
Construction of dynamic threshold schemes
-
SUN, H.M., and SHIEH, S.P.: 'Construction of dynamic threshold schemes', Electron. Lett., 1994, 30, (24), pp. 2023-2024
-
(1994)
Electron. Lett.
, vol.30
, Issue.24
, pp. 2023-2024
-
-
Sun, H.M.1
Shieh, S.P.2
-
16
-
-
0024141971
-
How to share a secret with cheaters
-
TOMPA, M., and WOLL, H.: 'How to share a secret with cheaters', J. Cryptol., 1988, 1, pp. 133-138
-
(1988)
J. Cryptol.
, vol.1
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
17
-
-
0029369348
-
Cheating detection and cheater identification in secret sharing schemes
-
WU, T.C., and WU, T.S.: 'Cheating detection and cheater identification in secret sharing schemes', IEE Proc. E, Comput. Digit. Tech. (UK), 1995, 142, (5), pp. 367-369
-
(1995)
IEE Proc. E, Comput. Digit. Tech. (UK)
, vol.142
, Issue.5
, pp. 367-369
-
-
Wu, T.C.1
Wu, T.S.2
|