-
1
-
-
0000525949
-
Some recursive constructions for perfect hash families
-
M. Atici, S.S. Magliveras, D.R. Stinson, W.D. Wei, Some recursive constructions for perfect hash families, Journal of Combinatorial Designs 4 (1996) 353-363.
-
(1996)
Journal of Combinatorial Designs
, vol.4
, pp. 353-363
-
-
Atici, M.1
Magliveras, S.S.2
Stinson, D.R.3
Wei, W.D.4
-
2
-
-
0000156664
-
Derandomization witnesses for Boolean matrix multiplication and construction of perfect hash functions
-
N. Alon, M. Naor, Derandomization witnesses for Boolean matrix multiplication and construction of perfect hash functions, Algorithmica 16 (1996) 434-449.
-
(1996)
Algorithmica
, vol.16
, pp. 434-449
-
-
Alon, N.1
Naor, M.2
-
3
-
-
0003723775
-
-
Cambridge University Press, Cambridge
-
T. Beth, D. Jungnickel, H. Lenz, Design Theory, Cambridge University Press, Cambridge, 1986.
-
(1986)
Design Theory
-
-
Beth, T.1
Jungnickel, D.2
Lenz, H.3
-
4
-
-
0345952600
-
Combinatorics and threshold cryptology
-
Chapman and Hall/CRC Research Notes in Mathematics, CRC Press, London
-
S.R. Blackburn, Combinatorics and threshold cryptology, in: Combinatorial Designs and their Applications, Chapman and Hall/CRC Research Notes in Mathematics, CRC Press, London, 1999, 49-70.
-
(1999)
Combinatorial Designs and their Applications
, pp. 49-70
-
-
Blackburn, S.R.1
-
5
-
-
84947917753
-
Efficient multiplicative sharing schemes
-
Lecture Notes in Computer Science, Springer, Berlin
-
S.R. Blackburn, M. Burmester, Y. Desmedt, P.R. Wild, Efficient multiplicative sharing schemes, in: Advances in Cryptology-Eurocrypt '96, Lecture Notes in Computer Science, vol. 1070, Springer, Berlin, 1996, pp. 107-118.
-
(1996)
Advances in Cryptology-Eurocrypt '96
, vol.1070
, pp. 107-118
-
-
Blackburn, S.R.1
Burmester, M.2
Desmedt, Y.3
Wild, P.R.4
-
7
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
E.F. Brickell (Ed.), Springer, Berlin
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly-secure key distribution for dynamic conferences, in: E.F. Brickell (Ed.), Advances in Cryptology - Crypto '92, Proceedings, Lecture Notes in Computer Science, vol. 740, Springer, Berlin, 1993, pp. 471-486.
-
(1993)
Advances in Cryptology - Crypto '92, Proceedings, Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
8
-
-
0030082030
-
Applications of mobile computing and communication
-
B. Bruegge, B. Bennington, Applications of mobile computing and communication, IEEE Personal Communication 3 (1) (1996) 64-71.
-
(1996)
IEEE Personal Communication
, vol.3
, Issue.1
, pp. 64-71
-
-
Bruegge, B.1
Bennington, B.2
-
9
-
-
0031208857
-
-
Z.J. Czech, G. Havas, B.S. Majewski, Perfect hashing, Theoretical Computer Science 182 (1997) 1-143.
-
(1997)
Perfect Hashing, Theoretical Computer Science
, vol.182
, pp. 1-143
-
-
Czech, Z.J.1
Havas, G.2
Majewski, B.S.3
-
13
-
-
84890457246
-
Broadcast anti-jamming systems
-
Y. Desmedt, R. Safavi-Naini, H. Wang, C. Charnes, J. Pieprzyk, Broadcast anti-jamming systems, in: IEEE International Conference in Netwoking, ICON'99.
-
IEEE International Conference in Netwoking, ICON'99
-
-
Desmedt, Y.1
Safavi-Naini, R.2
Wang, H.3
Charnes, C.4
Pieprzyk, J.5
-
14
-
-
0029362456
-
On key storage in secure networks
-
M. Dyer, T. Fenner, A. Frieze, A. Thomason, On key storage in secure networks, Journal of Cryptology 8 (1995) 189-200.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
15
-
-
0000934255
-
Families of finite sets in which no set is covered by the union of two others
-
P. Erdös, P. Frankl, Z. Furedi, Families of finite sets in which no set is covered by the union of two others, Journal of Combinatorial Theory A 33 (1982) 158-166.
-
(1982)
Journal of Combinatorial Theory A
, vol.33
, pp. 158-166
-
-
Erdös, P.1
Frankl, P.2
Furedi, Z.3
-
16
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
Israel
-
P. Erdós, P. Frankl, Z. Furedi, Families of finite sets in which no set is covered by the union of r others, Israel Journal of Mathematics 51 (1985) 79-89.
-
(1985)
Journal of Mathematics
, vol.51
, pp. 79-89
-
-
Erdós, P.1
Frankl, P.2
Furedi, Z.3
-
17
-
-
84979291225
-
Broadcast encryption
-
Springer, Berlin
-
A. Fiat, M. Naor, Broadcast encryption, in: Advances in Cryptology-Crypto '93, Lecture Notes in Computer Science, vol. 773, Springer, Berlin, 1994, pp. 480-491.
-
(1994)
Advances in Cryptology-Crypto '93, Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
18
-
-
0030122596
-
Combinatorial bounds and design of broadcast authentication
-
H. Fujii, W. Kachen, K. Kurosawa, Combinatorial bounds and design of broadcast authentication, IEICE Trans. E - A 79 (4) (1996) 502-506.
-
(1996)
IEICE Trans. E - A
, vol.79
, Issue.4
, pp. 502-506
-
-
Fujii, H.1
Kachen, W.2
Kurosawa, K.3
-
19
-
-
0025212474
-
A matrix key-distribution scheme
-
L. Gong, D.J. Wheeler, A matrix key-distribution scheme, J. Cryptology 2 (1990) 51-59.
-
(1990)
J. Cryptology
, vol.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
21
-
-
0347843892
-
-
CRC, Boca Raton
-
A. Menezes, P. van Oorschot, S. Vanstone, Applied Cryptography, CRC, Boca Raton, 1996.
-
(1996)
Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
23
-
-
0002828874
-
Key distribution patterns using Minkowski planes
-
C.M. O'Keefe, Key distribution patterns using Minkowski planes, Designs, Codes and Cryptography 5 (1995) 261-267.
-
(1995)
Designs, Codes and Cryptography
, vol.5
, pp. 261-267
-
-
O'Keefe, C.M.1
-
25
-
-
0002724154
-
Some constructions for key distribution patterns
-
K.A.S. Quinn, Some constructions for key distribution patterns, Designs Codes and Cryptography 4 (1994) 177-191.
-
(1994)
Designs Codes and Cryptography
, vol.4
, pp. 177-191
-
-
Quinn, K.A.S.1
-
27
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
D.R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption, Designs Codes and Cryptography 12 (1997) 215-243.
-
(1997)
Designs Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
|