-
1
-
-
0030291506
-
Priority encoding transmission
-
Nov.
-
A. Albanese, J. Bloemer, J. Edmonds, M. Luby and M. Sudan, "Priority Encoding Transmission", IEEE Tran. on Inf. Th., Vol. 42. No. 6, Nov. 1996.
-
(1996)
IEEE Tran. on Inf. Th.
, vol.42
, Issue.6
-
-
Albanese, A.1
Bloemer, J.2
Edmonds, J.3
Luby, M.4
Sudan, M.5
-
2
-
-
0013427153
-
Probabilistic methods in external finite set theory
-
N. Alon, "Probabilistic Methods in External Finite Set Theory", in Extremal Problems for Finite Sets, 1991, 39-57.
-
(1991)
Extremal Problems for Finite Sets
, pp. 39-57
-
-
Alon, N.1
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
LNCS, Springer-Verlag
-
M. Bellare, R. Canetti and H. Krawczyk, "Keying Hash Functions for Message Authentication", Advances in Cryprology - Cgpto'96, LNCS vol. 1109. Springer-Verlag, 1996.
-
(1996)
Advances in Cryprology - Cgpto'96
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali, "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", SIAM J. on Comp., 13, 1984, 850-864.
-
(1984)
SIAM J. on Comp.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
6
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
LNCS, Springer-Verlag
-
C. Blundo. A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, "Perfectly-secure key distribution for dynamic conferences, Advances in Cryptofogy - Crypro'92, LNCS vol. 740. Springer-Verlag. 1993, 471- 486.
-
(1993)
Advances in Cryptofogy - Crypro'92
, vol.740
, pp. 471-486
-
-
Santis, C.Blundo.A.D.1
Herzberg, A.2
Kutten, S.3
Vaccaro, U.4
Yung, M.5
-
7
-
-
0013001552
-
Proactive security: Long-term protection against break-ins
-
Sprint
-
R. Canetti. R. Gennaro. D. Herzberg and D. Naor, "Proactive Security: Long-term protection against break-ins", Crypto Bytes, Vol. 3, No. 1, Sprint 1997.
-
(1997)
Crypto Bytes
, vol.3
, Issue.1
-
-
Herzberg, R.1
Canetti, R.2
Gennaro, D.3
Naor, D.4
-
9
-
-
85023809951
-
Threshold cryptosystems
-
LNCS, Springer-Verlag
-
Y. Desmedt and Y. Frankel,'Threshold cryptosystems". Advances in Cryptology - Crypto'89, LNCS vol. 435, Springer-Verlag, 1990, pp. 307- 315.
-
(1990)
Advances in Cryptology - Crypto'89
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
10
-
-
0026992399
-
Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
-
Y. Desmedt, Y. Frankel and M. Yung, "Multi-receiverMulti-sender network security: efficient authenticated multicastlfeedback", IEEE Infocom'92. pp. 2045-2054.
-
IEEE Infocom'92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
11
-
-
0029362456
-
On key storage in secure networks
-
M. Dyer, T. Fenner, A. Frieze and A. Thomason, "On Key Storage in Secure Networks", J. of Cryptology, Vol. 8, 1995, 189-200.
-
(1995)
J. of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
13
-
-
0011000478
-
An introduction to threshold cryptography
-
Winter
-
Gemmel P., "An introduction to threshold cryptography", in CrypfoByres, Winter 1997, 7-12.
-
(1997)
CrypfoByres
, pp. 7-12
-
-
Gemmel, P.1
-
16
-
-
0003285503
-
Group key management protocol (GKMP) architecture
-
July
-
Hamey H. and Muckenhim C., "Group Key Management Protocol (GKMP) Architecture", RFC 2094. July 1997.
-
(1997)
RFC 2094
-
-
Hamey, H.1
Muckenhim, C.2
-
17
-
-
84902476908
-
-
URL
-
IP Security Protocol (ipsec), IETF working group. URL: http://www.ietf.org/html.charters/ipsec-charter.html.
-
IP Security Protocol (Ipsec)
-
-
-
19
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
February
-
H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
-
(1997)
RFC 2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
22
-
-
0000961370
-
Iolus: A framework for scalable secure multicasting
-
Cannes, France, Sept.
-
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting", Proc. of the ACM SIGCOMM'97, Cannes, France, Sept. 1997.
-
(1997)
Proc. of the ACM SIGCOMM'97
-
-
Mittra, S.1
-
23
-
-
84957617971
-
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACS
-
LNCS vol. 1462, Springer-Verlag
-
M. Naor and O. Reingold, "From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACS", Advances in Cryprology - Crypro'98, LNCS vol. 1462, Springer-Verlag, 1998, pp. 267-282.
-
(1998)
Advances in Cryprology - Crypro'98
, pp. 267-282
-
-
Naor, M.1
Reingold, O.2
-
24
-
-
0003195066
-
The MD5 message digest algorithm
-
April
-
R. L. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992.
-
(1992)
RFC 1321
-
-
Rivest, R.L.1
-
25
-
-
84957715332
-
New results on multi-receiver authentication code
-
LNCS vol. 1403, Springer-Verlag
-
R. Safavi-Naini and H. Wang, "New results on Multi-receiver Authentication Code, " Advances in Cryptology - EVROCRYPT'98, LNCS vol. 1403, Springer-Verlag, 1998, pp. 527-541.
-
(1998)
Advances in Cryptology - EVROCRYPT'98
, pp. 527-541
-
-
Safavi-Naini, R.1
Wang, H.2
-
30
-
-
0003976197
-
Digital signatures for flows and multicasts
-
The University of Texas at Austin, July, 1998
-
C.K. Wong and S. Lam, "Digital Signatures for Flows and Multicasts", The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-98-15.Ju ly 1998. 1998, pp. 267-282.
-
(1998)
Department of Computer Sciences, Technical Report TR-98-15
, pp. 267-282
-
-
Wong, C.K.1
Lam, S.2
|