-
1
-
-
0002015048
-
Visual cryptography for general access structures
-
Ateniese G., Blundo C., De Santis A., Stinson D.R. Visual cryptography for general access structures. Inform. and Comput. 129(2):1996;86-106.
-
(1996)
Inform. and Comput.
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
2
-
-
84947751790
-
Constructions and bounds for visual cryptography ICALP 1996
-
G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Constructions and bounds for visual cryptography ICALP 1996, Lecture Notes in Computer Science, Vol. 1099, 1996, pp. 416-428.
-
(1996)
Lecture Notes in Computer Science
, vol.1099
, pp. 416-428
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
4
-
-
0028429265
-
Universally ideal secret sharing schemes
-
Beimel A., Chor B. Universally ideal secret sharing schemes. IEEE Trans. Inform. Theory. 40(3):1994;786-794.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, Issue.3
, pp. 786-794
-
-
Beimel, A.1
Chor, B.2
-
5
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Proc. Crypto '88, Advances in Cryptology
-
J. Benaloh, J. Leichter, Generalized secret sharing and monotone functions, Proc. Crypto '88, Advances in Cryptology, Lecture Notes in Computer Science, Vol. 403, 1990, pp. 27-35.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
6
-
-
85062838317
-
Safeguarding cryptographic keys
-
G.R. Blakley, Safeguarding cryptographic keys, AFIPS Conf. Proc., vol. 48, 1979, pp. 313-317.
-
(1979)
AFIPS Conf. Proc.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
7
-
-
0038813895
-
Contrast optimal threshold visual cryptography schemes
-
Blundo C., D'Arco P., De Santis A., Stinson D.R. Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16(2):2003;224-261.
-
(2003)
SIAM J. Discrete Math.
, vol.16
, Issue.2
, pp. 224-261
-
-
Blundo, C.1
D'Arco, P.2
De Santis, A.3
Stinson, D.R.4
-
8
-
-
1642643212
-
New constructions for visual cryptography
-
P. Degano, U. Vaccaro, G. Pirillo (Eds.), World Scientific, Singapore
-
C. Blundo, A. De Bonis, New constructions for visual cryptography, in: P. Degano, U. Vaccaro, G. Pirillo (Eds.), Proc. ICTCS '98, World Scientific, Singapore, 1998, pp. 290-303.
-
(1998)
Proc. ICTCS '98
, pp. 290-303
-
-
Blundo, C.1
De Bonis, A.2
-
11
-
-
0029631974
-
Graph decompositions and secret sharing schemes
-
Blundo C., De Santis A., Stinson D.R., Vaccaro U. Graph decompositions and secret sharing schemes. J. Cryptology. 8(1):1995;39-64.
-
(1995)
J. Cryptology
, vol.8
, Issue.1
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
12
-
-
0000437895
-
On the contrast in visual cryptography schemes
-
Blundo C., De Santis A., Stinson D.R. On the contrast in visual cryptography schemes. J. Cryptology. 12:1999;261-289.
-
(1999)
J. Cryptology
, vol.12
, pp. 261-289
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
-
15
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
Brickell E.F., Stinson D.R. Some improved bounds on the information rate of perfect secret sharing schemes. J. Cryptology. 5:1992;153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
16
-
-
84944046626
-
Randomness in visual cryptography
-
Proc. 17th Internat. Symp. on Theoretical Aspects of Computer Science, STACS 2000
-
A. De Bonis, A. De Santis, Randomness in visual cryptography, in: Proc. 17th Internat. Symp. on Theoretical Aspects of Computer Science, STACS 2000, Lecture Notes in Computer Science, Vol. 1770, 2000, pp. 626-638.
-
(2000)
Lecture Notes in Computer Science
, vol.1770
, pp. 626-638
-
-
De Bonis, A.1
De Santis, A.2
-
17
-
-
1642612042
-
Randomness optimal visual cryptography schemes for strong access structures on at most four participants
-
Università di Salerno, June
-
A. De Bonis, A. De Santis, Randomness optimal visual cryptography schemes for strong access structures on at most four participants, Tech. Report, Università di Salerno, June 2001.
-
(2001)
Tech. Report
-
-
De Bonis, A.1
De Santis, A.2
-
18
-
-
84904269549
-
Secret sharing and visual cryptography schemes (a randomness preserving transformation)
-
A. De Bonis, A. De Santis, Secret sharing and visual cryptography schemes (a randomness preserving transformation), in: Proc. IFIP/SEC 2001, 2001, pp. 123-137.
-
(2001)
Proc. IFIP/SEC 2001
, pp. 123-137
-
-
De Bonis, A.1
De Santis, A.2
-
19
-
-
1642627481
-
New results on the randomness of visual cryptography
-
Birkhäuser
-
A. De Bonis, A. De Santis, New results on the randomness of visual cryptography, in: Proc Workshop on Cryptography and Computational Number Theory, CCNT'99, Birkhäuser, 2001, pp. 187-201.
-
(2001)
Proc Workshop on Cryptography and Computational Number Theory, CCNT'99
, pp. 187-201
-
-
De Bonis, A.1
De Santis, A.2
-
20
-
-
0024079508
-
Zero error capacity under list decoding
-
Elias P. Zero error capacity under list decoding. IEEE Trans. Inform. Theory. 34(5):1988;1070-1074.
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, Issue.5
, pp. 1070-1074
-
-
Elias, P.1
-
21
-
-
0002302934
-
On the size of separating system and families of perfect hash functions
-
Fredman M.L., Komlós J. On the size of separating system and families of perfect hash functions. SIAM J. Algebraic Discrete Math. 5(1):1984.
-
(1984)
SIAM J. Algebraic Discrete Math.
, vol.5
, Issue.1
-
-
Fredman, M.L.1
Komlós, J.2
-
22
-
-
84947730729
-
Contrast-optimal k out of n secret sharing schemes in visual cryptography
-
COCOON '97
-
T. Hofmeister, M. Krause, H.U. Simon, Contrast-optimal k out of n secret sharing schemes in visual cryptography, COCOON '97, Lecture Notes in Computer Science, Vol. 1276, 1997, pp. 176-185.
-
(1997)
Lecture Notes in Computer Science
, vol.1276
, pp. 176-185
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.U.3
-
24
-
-
0023543848
-
Secret sharing scheme realizing general access structure
-
Globecom 87, Tokyo, Japan
-
M. Ito, A. Saito, T. Nishizeki, Secret sharing scheme realizing general access structure, Proc. IEEE Global Telecommunications Conf., Globecom 87, Tokyo, Japan, 1987.
-
(1987)
Proc. IEEE Global Telecommunications Conf.
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
26
-
-
84926193517
-
Visual cryptography, Advances in Cryptology - EUROCRYPT '94
-
M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950, 1995, pp. 1-12.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
27
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Comm. ACM. 22:1979;612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
28
-
-
1642612040
-
Decomposition constructions for secret sharing schemes
-
Simmons G.J., Jackson W.-A., Martin K. Decomposition constructions for secret sharing schemes. Bull. ICA. 1:1991;72-88.
-
(1991)
Bull. ICA
, vol.1
, pp. 72-88
-
-
Simmons, G.J.1
Jackson, W.-A.2
Martin, K.3
-
29
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
Stinson D.R. Decomposition constructions for secret sharing schemes. IEEE Trans. Inform. Theory. 20(1):1994;110-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.20
, Issue.1
, pp. 110-125
-
-
Stinson, D.R.1
-
31
-
-
0012952067
-
An introduction to visual cryptography
-
Toronto, Canada, 28-30 April
-
D.R. Stinson, An introduction to visual cryptography, Presented at Public Key Solutions '97, Toronto, Canada, 28-30 April 1997. Available as http://bibd.unl.edu/~stinson/VKS-PKS.ps.
-
(1997)
Public Key Solutions '97
-
-
Stinson, D.R.1
-
32
-
-
0000049121
-
Constructions and properties of k out of n visual secret sharing schemes
-
Verheul E.R., van Tilborg H.C.A. Constructions and properties of. k out of n visual secret sharing schemes Designs Codes and Cryptogr. 11(2):1997;179-196.
-
(1997)
Designs Codes and Cryptogr.
, vol.11
, Issue.2
, pp. 179-196
-
-
Verheul, E.R.1
Van Tilborg, H.C.A.2
|