-
1
-
-
0003415652
-
-
Addison-Wesley, Reading, Mass
-
Aho, A.V., Hopcroft, J.E., Ullman, J.D., 1974. The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, Mass.
-
(1974)
The Design and Analysis of Computer Algorithms
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
2
-
-
0025700831
-
Improved digital signature scheme based on discrete exponentiation
-
Agnew G.B., Mallin R.C., Vanatone J. Improved digital signature scheme based on discrete exponentiation. Electronics Letters. 26(14):1990;1024-1025.
-
(1990)
Electronics Letters
, vol.26
, Issue.14
, pp. 1024-1025
-
-
Agnew, G.B.1
Mallin, R.C.2
Vanatone, J.3
-
4
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Springer, Heidelberg
-
Benaloh, J., Leichter, J. 1990. Generalized secret sharing and monotone functions. Advances in Cryptology-Crypto '88, Springer, Heidelberg, 27-35.
-
(1990)
Advances in Cryptology-Crypto '88
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
5
-
-
0001318089
-
Safeguarding Cryptographic Keys, Proceedings of the National Computer Conference
-
Blakley G.R. Safeguarding Cryptographic Keys, Proceedings of the National Computer Conference. American Federation of Information Processing Societies. 48:1979;242-268.
-
(1979)
American Federation of Information Processing Societies
, vol.48
, pp. 242-268
-
-
Blakley, G.R.1
-
6
-
-
84961369151
-
Security of ramp schemes
-
Springer, Heidelberg
-
Blakley, G.R., Meadows, C., 1984. Security of ramp schemes. Advances in Cryptology-Crypto '84. Springer, Heidelberg, 242-268.
-
(1984)
Advances in Cryptology-Crypto '84
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
7
-
-
84955577744
-
The detection of cheaters in threshold schemes
-
Springer, Heidelberg
-
Brickell E.F., Stinton, D.R., 1990. The detection of cheaters in threshold schemes. Advances in Cryptology-Crypto '88, Springer, Heidelberg, 564-577.
-
(1990)
Advances in Cryptology-Crypto '88
, pp. 564-577
-
-
Brickell, E.F.1
Stinton, D.R.2
-
8
-
-
85031623990
-
-
Digital Signature Standard, National Bureau of Standards FIPS Publication 186
-
Digital Signature Standard, National Bureau of Standards FIPS Publication 186, 1994.
-
(1994)
-
-
-
9
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. IT-31:1985;469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
10
-
-
0028762624
-
New Digital Signature Scheme Based on Discrete Logarithm
-
Harn L. New Digital Signature Scheme Based on Discrete Logarithm. Electronics Letters. 30(5):1994;396-398.
-
(1994)
Electronics Letters
, vol.30
, Issue.5
, pp. 396-398
-
-
Harn, L.1
-
11
-
-
0028547435
-
Design of Generaliszed ElGamal Type Digital Signature Scheme Based on Discrete Logarithm
-
Harn L., Xu Y. Design of Generaliszed ElGamal Type Digital Signature Scheme Based on Discrete Logarithm. Electronics Letters. 30(24):1994;2025-2026.
-
(1994)
Electronics Letters
, vol.30
, Issue.24
, pp. 2025-2026
-
-
Harn, L.1
Xu, Y.2
-
14
-
-
0023543848
-
Secret Sharing Scheme Realizing Generalized Access Structure
-
Tokyo
-
Ito, M., Saito, A., Nishizeki, T., 1987. Secret Sharing Scheme Realizing Generalized Access Structure. Proceedings of IEEE Global Telecommunication Conference, Globecom'87, Tokyo, 99-102.
-
(1987)
Proceedings of IEEE Global Telecommunication Conference, Globecom'87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
16
-
-
0345121672
-
Generalized threshold cryptosystems
-
Springer, Heidelberg
-
Laih, C.H., Harn, L., 1991. Generalized threshold cryptosystems. Advances in Cryptology-Asiacrypt '91, Springer, Heidelberg, 159-166.
-
(1991)
Advances in Cryptology-Asiacrypt '91
, pp. 159-166
-
-
Laih, C.H.1
Harn, L.2
-
17
-
-
0029375592
-
Authenticated Encryption Scheme without Using a One Way Function
-
Lee W.B., Chang C.C. Authenticated Encryption Scheme without Using a One Way Function. Electronics Letters. 31(19):1995;1656-1657.
-
(1995)
Electronics Letters
, vol.31
, Issue.19
, pp. 1656-1657
-
-
Lee, W.B.1
Chang, C.C.2
-
18
-
-
0344259195
-
A generalized secret sharing scheme with cheater detection
-
Springer, Heidelberg
-
Lin, H.Y., Harn, L., 1991. A generalized secret sharing scheme with cheater detection. Advances in Cryptology-Asiacrypt '91, Springer, Heidelberg, 149-158.
-
(1991)
Advances in Cryptology-Asiacrypt '91
, pp. 149-158
-
-
Lin, H.Y.1
Harn, L.2
-
20
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
-
Rivest R.L., Shamir A., Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM. 21(2):1978;120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
85031621545
-
-
Secure Hash Standard, National Bureau of Standards FIPS Publication 180
-
Secure Hash Standard, National Bureau of Standards FIPS Publication 180, 1993.
-
(1993)
-
-
-
22
-
-
0018545449
-
How to Share a Secret
-
Shamir A. How to Share a Secret. Communications of the ACM. 22(11):1974;612-613.
-
(1974)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0024141971
-
How to Share a Secret with Cheaters
-
Tompa M., Woll H. How to Share a Secret with Cheaters. Journal of Cryptology. 1(2):1988;133-138.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
24
-
-
0029369348
-
Cheating Detection and Cheater Identification in Secret Sharing Schemes
-
Wu T.C., Wu T.S. Cheating Detection and Cheater Identification in Secret Sharing Schemes. IEE Proceedings-Computers and Digital Techniques. 142(5):1995;367-369.
-
(1995)
IEE Proceedings-Computers and Digital Techniques
, vol.142
, Issue.5
, pp. 367-369
-
-
Wu, T.C.1
Wu, T.S.2
-
25
-
-
84935531957
-
Relationship Between MDS Codes and Threshold Scheme
-
Xain Y Y. Relationship Between MDS Codes and Threshold Scheme. Electronics Letters. 24(3):1988;154-156.
-
(1988)
Electronics Letters
, vol.24
, Issue.3
, pp. 154-156
-
-
Xain, Y.Y.1
|