-
1
-
-
0036487458
-
On some polynomials related to weight enumerators of linear codes
-
A. Barg. On some polynomials related to weight enumerators of linear codes. SIAM J. Discrete Math. 15 (2002) 155-164.
-
(2002)
SIAM J. Discrete Math.
, vol.15
, pp. 155-164
-
-
Barg, A.1
-
2
-
-
24144494482
-
Characterizing ideal weighted threshold secret sharing
-
A. Beimel, T. Tassa, E. Weinreb. Characterizing Ideal Weighted Threshold Secret Sharing. Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci. 3378 (2005) 600-619.
-
(2005)
Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci.
, vol.3378
, pp. 600-619
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. Proc. ACM STOC'88 (1988) 1-10.
-
(1988)
Proc. ACM STOC'88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E.F. Brickell, D.M. Davenport. On the classification of ideal secret sharing schemes. J. Cryptology. 4 (1991) 123-134.
-
(1991)
J. Cryptology.
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
6
-
-
4043128754
-
MacWilliams identities and matroid polynomials
-
Research Paper 19
-
T. Britz. MacWilliams identities and matroid polynomials. Electron. J. Combin. 9 (2002), Research Paper 19, 16 pp.
-
(2002)
Electron. J. Combin.
, vol.9
-
-
Britz, T.1
-
7
-
-
4043076181
-
Cycle index, weight enumerator, and Tutte polynomial
-
Note 2
-
P.J. Cameron. Cycle index, weight enumerator, and Tutte polynomial. Electron. J. Combin. 9 (2002), Note 2, 10 pp.
-
(2002)
Electron. J. Combin.
, vol.9
-
-
Cameron, P.J.1
-
12
-
-
0001672879
-
Weight enumeration and the geometry of linear codes
-
C. Greene. Weight enumeration and the geometry of linear codes. Studies in Appl. Math. 55 (1976) 119-128.
-
(1976)
Studies in Appl. Math.
, vol.55
, pp. 119-128
-
-
Greene, C.1
-
15
-
-
0013483720
-
Geometric secret sharing schemes and their duals
-
W.-A. Jackson, K.M. Martin. Geometric secret sharing schemes and their duals. Des. Codes Cryptogr. 4 (1994) 83-95.
-
(1994)
Des. Codes Cryptogr.
, vol.4
, pp. 83-95
-
-
Jackson, W.-A.1
Martin, K.M.2
-
16
-
-
0027154548
-
On span programs
-
San Diego, CA, 1993
-
M. Karchmer, A. Wigderson. On span programs. Proceedings of the Eighth Annual Structure in Complexity Theory Conference (San Diego, CA, 1993), 102-111, 1993.
-
(1993)
Proceedings of the Eighth Annual Structure in Complexity Theory Conference
, pp. 102-111
-
-
Karchmer, M.1
Wigderson, A.2
-
18
-
-
33645601443
-
Secret sharing schemes on access structures with intersection number equal to one
-
Amain, Italy, 2002
-
J. Martí-Farré, C. Padro. Secret sharing schemes on access structures with intersection number equal to one. In Proceedings of the Third Conference on Security in Communication Networks '02, Lecture Notes in Comput. Sci. 2576 (2003) 354-363. Amain, Italy, 2002.
-
(2003)
Proceedings of the Third Conference on Security in Communication Networks '02, Lecture Notes in Comput. Sci.
, vol.2576
, pp. 354-363
-
-
Martí-Farré, J.1
Padro, C.2
-
19
-
-
0345884729
-
Matroid representations by partitions
-
F. Matúš. Matroid representations by partitions. Discrete Mathematics 203 (1999) 169-194.
-
(1999)
Discrete Mathematics
, vol.203
, pp. 169-194
-
-
Matúš, F.1
-
20
-
-
0041928150
-
A representation of a family of secret sharing matroids
-
S.-L. Ng. A Representation of a Family of Secret Sharing Matroids. Des. Codes Cryptogr. 30 (2003) 5-19.
-
(2003)
Des. Codes Cryptogr.
, vol.30
, pp. 5-19
-
-
Ng, S.-L.1
-
21
-
-
0035452614
-
On the composition of matroids and ideal secret sharing schemes
-
S.-L. Ng, M. Walker. On the composition of matroids and ideal secret sharing schemes. Des. Codes Cryptogr. 24 (2001) 49-67.
-
(2001)
Des. Codes Cryptogr.
, vol.24
, pp. 49-67
-
-
Ng, S.-L.1
Walker, M.2
-
22
-
-
0004061262
-
-
Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
-
J.G. Oxley. Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
-
(1992)
Matroid Theory
-
-
Oxley, J.G.1
-
23
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. Padró, G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Transactions on Information Theory. 46 (2000) 2596-2604.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 2596-2604
-
-
Padró, C.1
Sáez, G.2
-
25
-
-
38249008268
-
On decoding by error location and dependent sets of error positions
-
R. Pellikaan. On decoding by error location and dependent sets of error positions. Discrete Math. 106/107 (1992) 369-381.
-
(1992)
Discrete Math.
, vol.106-107
, pp. 369-381
-
-
Pellikaan, R.1
-
26
-
-
0007088113
-
Essential dimensions of algebraic groups and a resolution theorem for G-varieties
-
With an appendix by János Kollár and Endre Szabó
-
Z. Reichstein, B. Youssin. Essential dimensions of algebraic groups and a resolution theorem for G-varieties. With an appendix by János Kollár and Endre Szabó. Canad. J. Math. 52 (2000) 1018-1056.
-
(2000)
Canad. J. Math.
, vol.52
, pp. 1018-1056
-
-
Reichstein, Z.1
Youssin, B.2
-
27
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. of the ACM. 22 (1979) 612-613.
-
(1979)
Commun. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
28
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
IEEE Press
-
G.J. Simmons. An introduction to shared secret and/or shared control schemes and their application. Contemporary Cryptology. The Science of Information Integrity. IEEE Press (1991), 441-497.
-
(1991)
Contemporary Cryptology. The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
30
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr. 2 (1992) 357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
|