-
1
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley, Safeguarding cryptographic keys, Proc. NCC AFIPS 1979, 313-317.
-
(1979)
Proc. NCC AFIPS
, pp. 313-317
-
-
Blakley, G.R.1
-
2
-
-
85005949623
-
Multi-secret sharing schemes
-
LNCS 773, Springer-Verlag
-
C. Blundo, A. De Santis, G. Di Cresceno, A. Gaggia, and U. Vaccaro, Multi-secret sharing schemes, Advances in Cryptology: Crypto'93, LNCS 773, Springer-Verlag, 1993, 126-135.
-
(1993)
Advances in Cryptology: Crypto'93
, pp. 126-135
-
-
Blundo, C.1
De Santis, A.2
Di Cresceno, G.3
Gaggia, A.4
Vaccaro, U.5
-
3
-
-
33947189263
-
Redundant residue polynomial codes
-
D. C. Bossen and S. S. Yau, Redundant residue polynomial codes, Information and Control, 13 (1968), 597-618.
-
(1968)
Information and Control
, vol.13
, pp. 597-618
-
-
Bossen, D.C.1
Yau, S.S.2
-
4
-
-
33947135072
-
Multisecret threshold schemes
-
LNCS 839, Springer-Verlag
-
W. A. Jackson, K. M. Martin, and C. M. O'Keefe, Multisecret threshold schemes, Advances in Cryptology: Crypto'94, LNCS 839, Springer-Verlag, 1994, 150-163.
-
(1994)
Advances in Cryptology: Crypto'94
, pp. 150-163
-
-
Jackson, W.A.1
Martin, K.M.2
O'Keefe, C.M.3
-
5
-
-
0020543282
-
On secret sharing systems
-
E. D. Karnin, J. W. Green and M. Hellman, On secret sharing systems, IEEE Trans Inform. Theory, Vol. IT-29 (1983), 35-41.
-
(1983)
IEEE Trans Inform. Theory
, vol.IT-29
, pp. 35-41
-
-
Karnin, E.D.1
Green, J.W.2
Hellman, M.3
-
7
-
-
0348104460
-
Minimal codewords and secret sharing
-
Mölle, Sweden, August 22-27
-
J. L. Massey, Minimal codewords and secret sharing, Proc. 6th Joint Swedish-Russian Workshop on Inform. Theory, Mölle, Sweden, August 22-27, 1993, 276-279.
-
(1993)
Proc. 6th Joint Swedish-Russian Workshop on Inform. Theory
, pp. 276-279
-
-
Massey, J.L.1
-
8
-
-
0346213336
-
Some applications of coding theory in cryptography
-
(Ed. P. G. Farrell). Esses, England: Formara Ltd.
-
J. L. Massey, Some applications of coding theory in cryptography, in Codes and Cyphers: Cryptography and Coding IV (Ed. P. G. Farrell). Esses, England: Formara Ltd., 1995, 33-47.
-
(1995)
Codes and Cyphers: Cryptography and Coding IV
, pp. 33-47
-
-
Massey, J.L.1
-
9
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R. J. McEliece and D. V. Sarwate, On sharing secrets and Reed-Solomon codes, Comm. ACM, Vol. 24 (1981), 583-584.
-
(1981)
Comm. ACM
, vol.24
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
11
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM, Vol. 22, 1979, 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
0001592017
-
How to (really) share a secret
-
LNCS 403, Springer
-
G. J. Simmons, How to (really) share a secret, Proc. Crypto'88, LNCS 403, Springer 1989, 390-448.
-
(1989)
Proc. Crypto'88
, pp. 390-448
-
-
Simmons, G.J.1
-
13
-
-
85030321871
-
Geometric shared secret and/or shared control schemes
-
LNCS 537, Springer
-
G. J. Simmons, Geometric shared secret and/or shared control schemes, Proc. Crypto'90, LNCS 537, Springer 1991, 216-241.
-
(1991)
Proc. Crypto'90
, pp. 216-241
-
-
Simmons, G.J.1
-
14
-
-
0000248498
-
A combinatorial approach to threshold schemes
-
D. R. Stinson and S. A. Vanstone, A combinatorial approach to threshold schemes, SIAM J. Disc. Math, vol. 1, No. 2 (1988), 230-236.
-
(1988)
SIAM J. Disc. Math
, vol.1
, Issue.2
, pp. 230-236
-
-
Stinson, D.R.1
Vanstone, S.A.2
-
15
-
-
0027969713
-
Reusing shares in secret sharing schemes
-
Y. Zheng, T. Hardjono, and J. Seberry, Reusing shares in secret sharing schemes, The Computer Journal 37 (1994), 199-205.
-
(1994)
The Computer Journal
, vol.37
, pp. 199-205
-
-
Zheng, Y.1
Hardjono, T.2
Seberry, J.3
|