-
2
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
Advances in Cryptology: Proc. of Eurocrypt 84, Springer-Verlag, Berlin, pp
-
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. of Eurocrypt 84, Lecture Notes in Computer Science, 209, Springer-Verlag, Berlin, pp. 335-338, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
3
-
-
85028765277
-
Perfectly-Secure Key Distribution for Dynamic Conferences,
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences," Lecture Notes in Computer Science, vol 740, pp 471-486, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
0017018484
-
New Directions in Cryptography
-
Dec
-
T. Matsumoto, M.E.Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, IT-22(6), Dec. 1976, pp.644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Matsumoto, T.1
Hellman, M.E.2
-
5
-
-
0005053804
-
Some New Results on Key Distribution Patterns and Broadcast Encryption
-
D. R. Stinson, T. van Trung, "Some New Results on Key Distribution Patterns and Broadcast Encryption," Designs, Codes and Cryptography, 14 (3) pp 261-279, 1998.
-
(1998)
Designs, Codes and Cryptography
, vol.14
, Issue.3
, pp. 261-279
-
-
Stinson, D.R.1
van Trung, T.2
-
6
-
-
0029362456
-
On Key Storage in Secure Networks
-
M. Dyer, T. Fenner, A. Frieze and A. Thomason, "On Key Storage in Secure Networks," Journal of Cryptology, 8, 189-200, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
7
-
-
33947117110
-
-
M. Ramkumar, N. Memon, R. Simha, Pre-Loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-Hoc Networks, Globecom-2003.
-
M. Ramkumar, N. Memon, R. Simha, "Pre-Loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-Hoc Networks," Globecom-2003.
-
-
-
-
8
-
-
84949023663
-
Secret-key Agreement without Public-Key Cryptography,Advances in Cryptology
-
T. Leighton, S. Micali, "Secret-key Agreement without Public-Key Cryptography,"Advances in Cryptology - CRYPTO 1993, pp 456-479, 1994.
-
(1994)
CRYPTO 1993
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
9
-
-
33947125255
-
DOWN with Trusted Devices
-
submitted to the New Security Paradigms Workshop NSPW
-
M. Ramkumar, "DOWN with Trusted Devices," submitted to the New Security Paradigms Workshop (NSPW 2005).
-
(2005)
-
-
Ramkumar, M.1
-
10
-
-
46449138830
-
Controlled Physical Random Functions
-
San Diego, CA, Dec
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, "Controlled Physical Random Functions," 18th Annual Computer Security Applications Conference, San Diego, CA, Dec 2002.
-
(2002)
18th Annual Computer Security Applications Conference
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
12
-
-
0002380073
-
Tamper Resistance - a Cautionary Note
-
Oakland, CA
-
R. Anderson, M. Kahn, "Tamper Resistance - a Cautionary Note," Second USENIX Workshop on Electronic Commerce Proceedings, pp 1-11, Oakland, CA 1996.
-
(1996)
Second USENIX Workshop on Electronic Commerce Proceedings
, pp. 1-11
-
-
Anderson, R.1
Kahn, M.2
-
13
-
-
84858897478
-
-
Semiconductor Insights Inc, available at
-
Semiconductor Insights Inc., "Tamper Resistance - A Second Opinion," available at http://www.smartcard.co.uk/resources/articles/ tamperres.html.
-
Tamper Resistance - A Second Opinion
-
-
|