-
1
-
-
0026834814
-
-
N. Alon, J. Brück, J. Naor, M. Naor, and R. Roth, "Construction of asymptotically good low-rate error-correcting codes through pseudorandom graphs," IEEE Trans. Inform. Theory, vol. 38, pp. 509-516, Mar. 1992.
-
J. Brück, J. Naor, M. Naor, and R. Roth, "Construction of Asymptotically Good Low-rate Error-correcting Codes Through Pseudorandom Graphs," IEEE Trans. Inform. Theory, Vol. 38, Pp. 509-516, Mar. 1992.
-
-
Alon, N.1
-
3
-
-
33749918640
-
-
1996, pp. 1-11.
-
R. Andersen and M. Kühn, "Tamper resistance-A cautionary note," in Usenix Electronic Commerce Workshop, Oakland, 1996, pp. 1-11.
-
And M. Kühn, "Tamper Resistance-A Cautionary Note," in Usenix Electronic Commerce Workshop, Oakland
-
-
Andersen, R.1
-
4
-
-
84958641478
-
-
1997, pp. 513-525.
-
E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," in P roc. Advances in Cryptology-Crypto '97, LNCS 1294, 1997, pp. 513-525.
-
And A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in P Roc. Advances in Cryptology-Crypto '97, LNCS 1294
-
-
Biham, E.1
-
5
-
-
84957355967
-
-
D. Boneh, R. A. Demillo, and R. J. Lipton, "On the importance of checking computations," in Proc. Advances in Cryptology-Eurocrypt '97. 1997, pp. 37-51.
-
R. A. Demillo, and R. J. Lipton, "On the Importance of Checking Computations," in Proc. Advances in Cryptology-Eurocrypt '97. 1997, Pp. 37-51.
-
-
Boneh, D.1
-
7
-
-
0032162672
-
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital date," IEEE Trans. Inform. Theory, vol. 44, pp. 1897-1905, Sept. 1998.
-
And J. Shaw, "Collusion-secure Fingerprinting for Digital Date," IEEE Trans. Inform. Theory, Vol. 44, Pp. 1897-1905, Sept. 1998.
-
-
Boneh, D.1
-
8
-
-
0032661699
-
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. INFOCOM '99. vol. 2, New York, Mar. 1999, pp. 708-716.
-
J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," in Proc. INFOCOM '99. Vol. 2, New York, Mar. 1999, Pp. 708-716.
-
-
Canetti, R.1
-
9
-
-
0018456171
-
-
1979.
-
J.L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sei., vol. 18, pp. 143-154, 1979.
-
And M. N. Wegman, "Universal Classes of Hash Functions," J. Comput. Syst. Sei., Vol. 18, Pp. 143-154
-
-
Carter, J.L.1
-
10
-
-
84985922619
-
-
1994, LNCS 839, pp. 257-270.
-
B. Chor, A. Fiat, and M. Naor, "Tracing traitors," in Proc. Advances in Cryptology-Crypto '94: Springr-Verlag, 1994, LNCS 839, pp. 257-270.
-
A. Fiat, and M. Naor, "Tracing Traitors," in Proc. Advances in Cryptology-Crypto '94: Springr-Verlag
-
-
Chor, B.1
-
11
-
-
0031362116
-
-
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
-
J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. Image Processing, Vol. 6, Pp. 1673-1687, Dec. 1997.
-
-
Cox, I.J.1
-
12
-
-
0029720071
-
-
1996, pp. 489-498.
-
C. Dwork, J. Lotspiech, and M. Naor, "Digital signets: Self-enforcing protection of digital information," in 28th Symp. Theory of Computation, 1996, pp. 489-498.
-
J. Lotspiech, and M. Naor, "Digital Signets: Self-enforcing Protection of Digital Information," in 28th Symp. Theory of Computation
-
-
Dwork, C.1
-
13
-
-
51249175955
-
-
1985.
-
P. Erdös, P. Frankl, andZ. Fiiredi, "Families of finite sets in which no set is covered by the union of r others," Israel J. Math., vol. 51, pp. 79-89, 1985.
-
P. Frankl, AndZ. Fiiredi, "Families of Finite Sets in Which No Set Is Covered by the Union of R Others," Israel J. Math., Vol. 51, Pp. 79-89
-
-
Erdös, P.1
-
15
-
-
84957076207
-
-
1999, pp. 388-397.
-
A. Fiat and T. Tassa, "Dynamic traitor tracing," in Proc. Advances in Cryptology-Crypto '99, LNCS 1666, 1999, pp. 388-397.
-
And T. Tassa, "Dynamic Traitor Tracing," in Proc. Advances in Cryptology-Crypto '99, LNCS 1666
-
-
Fiat, A.1
-
16
-
-
0021467937
-
-
1984.
-
M.L. Fredman, J. Komlös, and E. Szemerédi, "Storing a sparse table with O(l) worst case access time," J. Assoc. Comput. Mach., vol. 31, pp. 538-544, 1984.
-
J. Komlös, and E. Szemerédi, "Storing A Sparse Table with O(l) Worst Case Access Time," J. Assoc. Comput. Mach., Vol. 31, Pp. 538-544
-
-
Fredman, M.L.1
-
17
-
-
0022793132
-
-
1986.
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. Assoc. Comput. Mach., vol. 33, pp. 792-807, 1986.
-
S. Goldwasser, and S. Micali, "How to Construct Random Functions," J. Assoc. Comput. Mach., Vol. 33, Pp. 792-807
-
-
Goldreich, O.1
-
18
-
-
84939573910
-
-
1999, pp. 388-397.
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. Advances in Cryptology-Crypto '99, LNCS 1666, 1999, pp. 388-397.
-
J. Jaffe, and B. Jun, "Differential Power Analysis," in Proc. Advances in Cryptology-Crypto '99, LNCS 1666
-
-
Kocher, P.1
-
21
-
-
84957617696
-
-
1998, pp. 502-517.
-
M. Naor and B. Pinkas, "Threshold traitor tracing," in Proc. Advances in Cryptology-Crypto '98, LNCS 1462, 1998, pp. 502-517.
-
And B. Pinkas, "Threshold Traitor Tracing," in Proc. Advances in Cryptology-Crypto '98, LNCS 1462
-
-
Naor, M.1
-
22
-
-
84954420982
-
-
1996, pp. 49-64.
-
B. Pfitzmann, "Trials of traced traitors," in Workshop on Information Hiding, LNCS 1174, Cambridge, U.K., 1996, pp. 49-64.
-
"Trials of Traced Traitors," in Workshop on Information Hiding, LNCS 1174, Cambridge, U.K.
-
-
Pfitzmann, B.1
-
23
-
-
0002016098
-
-
1998.
-
D.R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAM J. Discr. Math, vol. 11, pp. 41-53, 1998.
-
And R. Wei, "Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes," SIAM J. Discr. Math, Vol. 11, Pp. 41-53
-
-
Stinson, D.R.1
-
25
-
-
33749935500
-
-
D.M. Wallner, E. J. Harder, and R. C. Agée, "Key Management for Multicast: Issues and Architectures," RFC 2627, June 1999.
-
E. J. Harder, and R. C. Agée, "Key Management for Multicast: Issues and Architectures," RFC 2627, June 1999.
-
-
Wallner, D.M.1
-
26
-
-
0019572642
-
-
1981.
-
M.N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sei., vol. 22, pp. 265-279, 1981.
-
And J. L. Carter, "New Hash Functions and Their Use in Authentication and Set Equality," J. Comput. Syst. Sei., Vol. 22, Pp. 265-279
-
-
Wegman, M.N.1
|