-
1
-
-
0000229139
-
A partial characterization of poised Hermite-Birkhoff interpolation problems
-
K. Atkinson and A. Sharma, A partial characterization of poised Hermite-Birkhoff interpolation problems, SIAM Journal on Numerical Analysis, vol. 6 (1969), pp. 230-235.
-
(1969)
SIAM Journal on Numerical Analysis
, vol.6
, pp. 230-235
-
-
Atkinson, K.1
Sharma, A.2
-
2
-
-
24144494482
-
Characterizing ideal weighted threshold secret sharing
-
The Second Theory of Cryptography Conference, TCC, MIT, Cambridge, MA
-
A. Beimel, T. Tassa and E. Weinreb, Characterizing ideal weighted threshold secret sharing, The Second Theory of Cryptography Conference, TCC 2005, LNCS 3378, MIT, Cambridge, MA (2005), pp. 600-619.
-
(2005)
LNCS
, vol.3378
, pp. 600-619
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
3
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Advances in Cryptology, CRYPTO 88, Springer-Verlag, Berlin
-
J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Advances in Cryptology - CRYPTO 88, LNCS 403, Springer-Verlag, Berlin (1990), pp. 27-35.
-
(1990)
LNCS
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
4
-
-
33947514080
-
Geometric structures as threshold schemes
-
Clarendon Press, Oxford
-
A. Beutelspacjer and K. Vedder, Geometric structures as threshold schemes, in Cryptography and Coding, Clarendon Press, Oxford (1989), pp. 255-268.
-
(1989)
Cryptography and Coding
, pp. 255-268
-
-
Beutelspacjer, A.1
Vedder, K.2
-
5
-
-
85062838317
-
Safeguarding cryptographic keys
-
AFIPS
-
G.R. Blakley, Safeguarding cryptographic keys, The National Computer Conference 1979, AFIPS 48 (1979), pp. 313-317.
-
(1979)
The National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
7
-
-
33947544299
-
Sharing secret information in hierarchical groups
-
Information and Communications Security, Springer-Verlag, Berlin
-
C. Charnes, K. Martin, J. Pieprzyk and R. Safavi-Naini, Sharing secret information in hierarchical groups, Information and Communications Security, LNCS 1334, Springer-Verlag, Berlin (1997), pp. 81-86.
-
(1997)
LNCS
, vol.1334
, pp. 81-86
-
-
Charnes, C.1
Martin, K.2
Pieprzyk, J.3
Safavi-Naini, R.4
-
8
-
-
0028381890
-
The breadth of Shamir's secret sharing scheme
-
E. Dawson and D. Donovan, The breadth of Shamir's secret sharing scheme, Computers and Security, vol. 13 (1994), pp. 69-78.
-
(1994)
Computers and Security
, vol.13
, pp. 69-78
-
-
Dawson, E.1
Donovan, D.2
-
10
-
-
0021572570
-
Constructing O(n log n) size monotone formulae for the k-th elementary symmetric polynomial of n Boolean variables
-
J.Friedman, Constructing O(n log n) size monotone formulae for the k-th elementary symmetric polynomial of n Boolean variables, IEEE Symposium on Foundations of Computer Science (1984), pp. 506-515.
-
(1984)
IEEE Symposium on Foundations of Computer Science
, pp. 506-515
-
-
Friedman, J.1
-
14
-
-
0003856607
-
-
Addison-Wesley, Reading, MA
-
G.G. Lorentz, K. Jetter and S.D. Riemenschneider, Birkhoff Interpolation, Encyclopedia of Mathematics and its Applications, Vol. 19, Addison-Wesley, Reading, MA (1983).
-
(1983)
Birkhoff Interpolation, Encyclopedia of Mathematics and its Applications
, vol.19
-
-
Lorentz, G.G.1
Jetter, K.2
Riemenschneider, S.D.3
-
15
-
-
84885829587
-
Secret sharing schemes with bipartite access structure
-
Advances in Cryptology, EUROCRYPT 98, Springer-Verlag, Berlin
-
C. Padró and G. Sáez, Secret sharing schemes with bipartite access structure, Advances in Cryptology - EUROCRYPT 98, LNCS 1403, Springer-Verlag, Berlin (1998), pp. 500-511.
-
(1998)
LNCS
, vol.1403
, pp. 500-511
-
-
Padró, C.1
Sáez, G.2
-
17
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM, vol. 22 (1979), pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
84898132112
-
How to (really) share a secret
-
Advances in Cryptology, CRYPTO 88, Springer-Verlag, Berlin
-
G.J. Simmons, How to (really) share a secret, Advances in Cryptology - CRYPTO 88, LNCS 403, Springer-Verlag, Berlin (1990), pp. 390-448.
-
(1990)
LNCS
, vol.403
, pp. 390-448
-
-
Simmons, G.J.1
-
19
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their applications
-
IEEE Press, Piscataway, NJ
-
G.J. Simmons, An introduction to shared secret and/or shared control schemes and their applications, in Contemporary Cryptology, The Science of Information Integrity, IEEE Press, Piscataway, NJ (1991), pp. 441-197.
-
(1991)
Contemporary Cryptology, The Science of Information Integrity
, pp. 441-197
-
-
Simmons, G.J.1
-
20
-
-
35048827923
-
Hierarchical threshold secret sharing
-
The First Theory of Cryptography Conference, TCC, MIT, Cambridge, MA
-
T. Tassa, Hierarchical threshold secret sharing, in The First Theory of Cryptography Conference, TCC 2004, LNCS 2951, MIT, Cambridge, MA (2004), pp. 473-490.
-
(2004)
LNCS
, vol.2951
, pp. 473-490
-
-
Tassa, T.1
-
21
-
-
33746381973
-
Multipartite Secret Sharing by Bivariate Interpolation
-
The 33rd International Colloquium on Automata, Languages and Programming, ICALP, Springer-Verlag, Berlin
-
T. Tassa and N. Dyn, Multipartite Secret Sharing by Bivariate Interpolation, The 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006, Part II, LNCS 4052, Springer-Verlag, Berlin (2006), pp. 288-299.
-
(2006)
LNCS
, vol.4052
, Issue.PART II
, pp. 288-299
-
-
Tassa, T.1
Dyn, N.2
-
22
-
-
33947530197
-
-
Private communication
-
A. Wool, Private communication.
-
-
-
Wool, A.1
|