-
1
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS, pages 62–73, 1993.
-
(1993)
ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
77950222301
-
Robust computational secret sharing and a unified account of classical secret-sharing goals
-
M. Bellare and P. Rogaway. Robust computational secret sharing and a unified account of classical secret-sharing goals. In ACM CCS, 2007.
-
(2007)
ACM CCS
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. Blakley. Safeguarding cryptographic keys. In AFIPS Conference Proceedings, volume 48, pages 313–317, 1979.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 440–456, 2005.
-
(2005)
EUROCRYPT, Volume 3494 of Lecture Notes in Computer Science
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
7
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586–615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. Brickell and D. R. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. Journal of Cryptology, 5:153–166, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
10
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. M. Capocelli, A. D. Santis, L. Gargano, and U. Vaccaro. On the size of shares for secret sharing schemes. Journal of Cryptology, 6:157–167, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, pp. 157-167
-
-
Capocelli, R.M.1
Santis, A.D.2
Gargano, L.3
Vaccaro, U.4
-
13
-
-
84887425133
-
-
EPC Global
-
EPC Global. EPC® Item Level Tagging Joint Requirements Group. EPC Global, 2007.
-
(2007)
EPC Global
-
-
-
14
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Transactions on Information Theory, 45(6):1757–1767, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
15
-
-
33749028998
-
Strengthing EPC tags against cloning
-
ACM Press
-
A. Juels. Strengthing EPC tags against cloning. In ACM Workshop on Wireless Security (WiSe), pages 67–76. ACM Press, 2005.
-
(2005)
ACM Workshop on Wireless Security (WiSe)
, pp. 67-76
-
-
Juels, A.1
-
18
-
-
0020543282
-
On secret sharing systems
-
E. D. Karnin, J. W. Greene, and M. E. Hellman. On secret sharing systems. IEEE Transactions on Information Theory, 29(1):35–41, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
19
-
-
2642529529
-
Directions in polynomial reconstruction based cryptography
-
A. Kiayias and M. Yung. Directions in polynomial reconstruction based cryptography. IEICE Transactions, E87-A(5):978–985, 2004.
-
(2004)
IEICE Transactions
, vol.E87-A
, Issue.5
, pp. 978-985
-
-
Kiayias, A.1
Yung, M.2
-
20
-
-
85028775022
-
Secret sharing made short
-
New York, NY, USA, Springer-Verlag New York, Inc
-
H. Krawczyk. Secret sharing made short. In Advances in Cryptology: Proceedings of CRYPTO, pages 136–146, New York, NY, USA, 1994. Springer-Verlag New York, Inc.
-
(1994)
Advances in Cryptology: Proceedings of CRYPTO
, pp. 136-146
-
-
Krawczyk, H.1
-
22
-
-
38349076613
-
RFID privacy using spatially distributed shared secrets
-
LNCS, Berlin Heidelberg New York, Nov. Springer. To appear
-
M. Langheinrich and R. Marti. RFID privacy using spatially distributed shared secrets. In Proceedings of UCS 2007, LNCS, Berlin Heidelberg New York, Nov. 2007. Springer. (To appear).
-
(2007)
Proceedings of UCS 2007
-
-
Langheinrich, M.1
Marti, R.2
-
23
-
-
84937740421
-
Shift register synthesis and BCH decoding
-
J. L. Massey. Shift register synthesis and BCH decoding. IEEE Transactions on Information Theory, 15(1):122–127, 1969.
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
25
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 24(9):583–584, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
26
-
-
1942544259
-
Some basic properties of general nonperfect secret sharing schemes
-
W. Ogata and K. Kurosawa. Some basic properties of general nonperfect secret sharing schemes. Journal of Universal Computer Science, 4(8), 1998.
-
(1998)
Journal of Universal Computer Science
, vol.4
, Issue.8
-
-
Ogata, W.1
Kurosawa, K.2
-
28
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. Journal SIAM, 8:300–304, 1960.
-
(1960)
Journal SIAM
, vol.8
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
29
-
-
35348886929
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Nov
-
P. Rogaway, M. Bellare, and J. Black. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM TISSEC, Nov. 2001.
-
(2001)
ACM TISSEC
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
31
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
R. J. Anderson, editor, Springer
-
B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In R. J. Anderson, editor, FSE, volume 809 of Lecture Notes in Computer Science, pages 191–204. Springer, 1993.
-
(1993)
FSE, Volume 809 of Lecture Notes in Computer Science
, pp. 191-204
-
-
Schneier, B.1
-
32
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|