-
1
-
-
0034826416
-
A Sieve Algorithm for the Shortest Lattice Vector Problem
-
New York, ACM Press
-
M. Ajtai, R. Kumar, and D. Sivakumar. A Sieve Algorithm for the Shortest Lattice Vector Problem. In Proc. 33-rd ACM Symp. on Theory of Comput., pages 601-610, New York, 2001. ACM Press.
-
(2001)
Proc. 33-rd ACM Symp. on Theory of Comput.
, pp. 601-610
-
-
Ajtai, M.1
Kumar, R.2
Sivakumar, D.3
-
3
-
-
51249173801
-
On Lovasz' Lattice Reduction and the Nearest Lattice Point Problem
-
L. Babai. On Lovasz' Lattice Reduction and the Nearest Lattice Point Problem. Combinatorica, 6, 1986.
-
(1986)
Combinatorica
, pp. 6
-
-
Babai, L.1
-
4
-
-
84996527783
-
Fully Dynamic Secret Sharing Schemes
-
CRYPTO '93, Berlin, Springer-Verlag
-
C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro. Fully Dynamic Secret Sharing Schemes. In CRYPTO '93, volume 773 of LNCS, pages 110-125, Berlin, 1993. Springer-Verlag.
-
(1993)
LNCS
, vol.773
, pp. 110-125
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
9
-
-
0033183669
-
Improved Decoding of Reed-Solomon Codes and Algebraic-Geometric Codes
-
Sep.
-
V. Guruswami and M. Sudan. Improved Decoding of Reed-Solomon Codes and Algebraic-Geometric Codes. IEEE Trans. Inf. Th., 45:1757-1767, Sep. 1999.
-
(1999)
IEEE Trans. Inf. Th.
, vol.45
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
11
-
-
0000351029
-
Algorithmic Geometry of Numbers
-
R. Kannan. Algorithmic Geometry of Numbers. Annual Review of Comp. Sci., 2:231-267, 1987.
-
(1987)
Annual Review of Comp. Sci.
, vol.2
, pp. 231-267
-
-
Kannan, R.1
-
13
-
-
84958752925
-
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
-
ACISP 2001, Berlin, Springer-Verlag
-
A. Maeda, A. Miyaji, and M. Tada. Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. In ACISP 2001, volume 2119 of LNCS, pages 402-416, Berlin, 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2119
, pp. 402-416
-
-
Maeda, A.1
Miyaji, A.2
Tada, M.3
-
14
-
-
0005269075
-
Untrustworthy Participants in Secret Sharing Schemes
-
Oxford University Press
-
K. Martin. Untrustworthy Participants in Secret Sharing Schemes. In Cryptography and Coding III, pages 255-264. Oxford University Press, 1993.
-
(1993)
Cryptography and Coding III
, pp. 255-264
-
-
Martin, K.1
-
15
-
-
33747469206
-
Changing Thresholds in the Absence of Secure Channels
-
K. Martin, J. Pieprzyk, R. Safavi-Naini, and H. Wang. Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal, 31:34-43, 1999.
-
(1999)
Australian Computer Journal
, vol.31
, pp. 34-43
-
-
Martin, K.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
-
16
-
-
0033351734
-
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures
-
K. Martin, R. Safavi-Naini, and H. Wang. Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. The Computer Journal, 8, 1999.
-
(1999)
The Computer Journal
, pp. 8
-
-
Martin, K.1
Safavi-Naini, R.2
Wang, H.3
-
17
-
-
84958962867
-
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem
-
PKC 2002, Berlin, Springer-Verlag
-
M. Quisquater, B. Preneel, and J. Vandewalle. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. In PKC 2002, volume 2274 of LNCS, pages 199-210, Berlin, 2002. Springer-Verlag.
-
(2002)
LNCS
, vol.2274
, pp. 199-210
-
-
Quisquater, M.1
Preneel, B.2
Vandewalle, J.3
-
18
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How To Share a Secret. Comm. of the ACM, 22:612-613,1979.
-
(1979)
Comm. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
0034830272
-
Sparse Polynomial Approximation in Finite Fields
-
New York, ACM Press
-
I.E. Shparlinski. Sparse Polynomial Approximation in Finite Fields. In Proc. 33rd STOC, pages 209-215, New York, 2001. ACM Press.
-
(2001)
Proc. 33rd STOC
, pp. 209-215
-
-
Shparlinski, I.E.1
|