-
1
-
-
84974705246
-
Authentication of concast communication
-
Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. Springer, Heidelberg
-
Al-Ibrahim, M., Ghodosi, H., Pieprzyk, J.: Authentication of concast communication. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 185-198. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2551
, pp. 185-198
-
-
Al-Ibrahim, M.1
Ghodosi, H.2
Pieprzyk, J.3
-
2
-
-
0004465320
-
A comparative survey of non-adaptive probing designs
-
Springer, Heidelberg
-
Balding, D.J., Bruno, W.J., Knill, E., Torney, D.C.: A comparative survey of non-adaptive probing designs. In: Genetic Mapping and DNA Sequencing, IMA. Math. and Its Applications, pp. 133-154. Springer, Heidelberg (1996)
-
(1996)
Genetic Mapping and DNA Sequencing, IMA. Math. and Its Applications
, pp. 133-154
-
-
Balding, D.J.1
Bruno, W.J.2
Knill, E.3
Torney, D.C.4
-
3
-
-
0010226251
-
Competitive group testing in high speed networks
-
Bar-Noy, A., Hwang, F.K., Kessler, I., Kutten, S.: Competitive group testing in high speed networks. Discrete Applied Math. 52, 29-38 (1994)
-
(1994)
Discrete Applied Math.
, vol.52
, pp. 29-38
-
-
Bar-Noy, A.1
Hwang, F.K.2
Kessler, I.3
Kutten, S.4
-
4
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Bellare, M., Garay, J., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236-250. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
5
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Journal of Cryptology 17, 297-319 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
84937411766
-
Attacking and repairing batch verification schemes
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Boyd, C., Pavlovski, C.: Attacking and repairing batch verification schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 58-71. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 58-71
-
-
Boyd, C.1
Pavlovski, C.2
-
7
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
38049146172
-
Batch verification of short signatures
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Østergaard Pedersen, M.: Batch verification of short signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 246-263. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Østergaard Pedersen, M.3
-
9
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pp. 201-210 (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS)
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
10
-
-
35248844436
-
An identity-based signature scheme from gap Diffie-Hellman groups
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
Cha, J., Cheon, J.: An identity-based signature scheme from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.1
Cheon, J.2
-
11
-
-
33745840439
-
Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Chatterjee, S., Sarkar, P.: Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 424-440. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 424-440
-
-
Chatterjee, S.1
Sarkar, P.2
-
12
-
-
85037335940
-
Distributed broadcast in radio networks of unknown topology
-
Clementi, A.E.F., Monti, A., Silvestri, R.: Distributed broadcast in radio networks of unknown topology. Th. Comp. Sci. 302, 337-364 (2003)
-
(2003)
Th. Comp. Sci.
, vol.302
, pp. 337-364
-
-
Clementi, A.E.F.1
Monti, A.2
Silvestri, R.3
-
13
-
-
0042008122
-
Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels
-
De Bonis, A., Vaccaro, U.: Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels. Th. Comp. Sci. 306, 223-243 (2003)
-
(2003)
Th. Comp. Sci.
, vol.306
, pp. 223-243
-
-
De Bonis, A.1
Vaccaro, U.2
-
14
-
-
0001243071
-
The detection of defective members of large populations
-
Dorfman, R.: The detection of defective members of large populations. Ann. Math. Statist. 14, 436-440 (1943)
-
(1943)
Ann. Math. Statist.
, vol.14
, pp. 436-440
-
-
Dorfman, R.1
-
17
-
-
33747309053
-
Optimal superimposed codes and designs for Renyi's search model
-
D'yachkov, A.G., Rykov, V.V.: Optimal superimposed codes and designs for Renyi's search model. J. Statist. Plann. Inference 100, 281-302 (2002)
-
(2002)
J. Statist. Plann. Inference
, vol.100
, pp. 281-302
-
-
D'Yachkov, A.G.1
Rykov, V.V.2
-
18
-
-
67650224819
-
Practical Short Signature Batch Verification
-
Fischlin, M. (ed.) RSA Conference 2009. Springer, Heidelberg
-
Ferrara, A.L., Green, M., Hohenberger, S., Østergaard Pedersen, M.: Practical Short Signature Batch Verification. In: Fischlin, M. (ed.) RSA Conference 2009. LNCS, vol. 5473, pp. 309-324. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5473
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
Østergaard Pedersen, M.4
-
19
-
-
84921021973
-
Batch RSA
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 175-185. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 175-185
-
-
Fiat, A.1
-
21
-
-
84974588069
-
Long-lived broadcast encryption
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Garay, J.A., Staddon, J.N., Wool, A.: Long-lived broadcast encryption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 333-352. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 333-352
-
-
Garay, J.A.1
Staddon, J.N.2
Wool, A.3
-
22
-
-
0041154231
-
A boundary problem for group testing
-
Hu, M.C., Hwang, F.K., Wang, J.K.: A boundary problem for group testing. SIAM J. Alg. Disc. Methods 2, 81-87 (1981)
-
(1981)
SIAM J. Alg. Disc. Methods
, vol.2
, pp. 81-87
-
-
Hu, M.C.1
Hwang, F.K.2
Wang, J.K.3
-
23
-
-
0023999022
-
The complexity of parallel search
-
Karp, R.M., Upfal, E., Wigderson, A.: The complexity of parallel search. J. Comput. Syst. Sci. 36, 225-253 (1988)
-
(1988)
J. Comput. Syst. Sci.
, vol.36
, pp. 225-253
-
-
Karp, R.M.1
Upfal, E.2
Wigderson, A.3
-
25
-
-
38149073980
-
Finding invalid signatures in pairing-based batches
-
Galbraith, S.D. (ed.) Cryptography and Coding 2007. Springer, Heidelberg
-
Law, L., Matt, B.J.: Finding invalid signatures in pairing-based batches. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 34-53. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4887
, pp. 34-53
-
-
Law, L.1
Matt, B.J.2
-
26
-
-
67049087745
-
Identification of multiple invalid signatures in pairing-based batched signatures
-
PKC 2009
-
Matt, B.J.: Identification of multiple invalid signatures in pairing-based batched signatures. In: PKC 2009. LNCS, vol. 5443, pp. 337-356 (2009)
-
(2009)
LNCS
, vol.5443
, pp. 337-356
-
-
Matt, B.J.1
-
28
-
-
84948995055
-
Can DSA be improved? Complexity trade-offs with the digital signature standard
-
De Santis, A. (ed.) EUROCRYPT 1994. Springer, Heidelberg
-
Naccache, D., M'raihi, D., Vaudenay, S., Raphaeli, D.: Can DSA be improved? Complexity trade-offs with the digital signature standard. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 77-85. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 77-85
-
-
Naccache, D.1
M'Raihi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
29
-
-
84957804123
-
Identification of bad signatures in batches
-
Imai, H., Zheng, Y. (eds.) PKC 2000. Springer, Heidelberg
-
Pastuszak, J., Michalek, D., Pieprzyk, J., Seberry, J.: Identification of bad signatures in batches. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 28-45. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1751
, pp. 28-45
-
-
Pastuszak, J.1
Michalek, D.2
Pieprzyk, J.3
Seberry, J.4
-
30
-
-
84947797206
-
Codes identifying bad signatures in batches
-
Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. Springer, Heidelberg
-
Pastuszak, J., Pieprzyk, J., Seberry, J.: Codes identifying bad signatures in batches. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 143-154. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 143-154
-
-
Pastuszak, J.1
Pieprzyk, J.2
Seberry, J.3
-
31
-
-
49149086879
-
Explicit non-adaptive combinatorial group testing schemes
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. Springer, Heidelberg
-
Porat, E., Rothschild, A.: Explicit non-adaptive combinatorial group testing schemes. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. LNCS, vol. 5125, pp. 748-759. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5125
, pp. 748-759
-
-
Porat, E.1
Rothschild, A.2
-
32
-
-
0011554908
-
On the theory of random search
-
Reyni, A.: On the theory of random search. Bull. Amer. Math Soc. 71, 809-828 (1965)
-
(1965)
Bull. Amer. Math Soc.
, vol.71
, pp. 809-828
-
-
Reyni, A.1
-
33
-
-
38149147626
-
On the upper bound of the size of the r-cover-free families
-
Ruszinkó, M.: On the upper bound of the size of the r-cover-free families. Journal of Combinatorial Theory Series A 66, 302-310 (1994)
-
(1994)
Journal of Combinatorial Theory Series A
, vol.66
, pp. 302-310
-
-
Ruszinkó, M.1
-
35
-
-
0041310561
-
Minimal completely separating systems
-
Spencer, J.: Minimal completely separating systems. Journal of Combinatorial Theory 8, 446-447 (1970)
-
(1970)
Journal of Combinatorial Theory
, vol.8
, pp. 446-447
-
-
Spencer, J.1
-
36
-
-
0000657407
-
Ein Satz Uber Untermengen einer endliche Menge
-
Sperner, E.: Ein Satz Uber Untermengen einer endliche Menge. Math. Zeit. 27, 544-548 (1928)
-
(1928)
Math. Zeit.
, vol.27
, pp. 544-548
-
-
Sperner, E.1
-
37
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47, 1042-1049 (2001)
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
38
-
-
0000137420
-
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
-
Stinson, D.R., van Trung, T., Wei, R.: Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. Journal of Statistical Planning and Inference 86, 595-617 (2000)
-
(2000)
Journal of Statistical Planning and Inference
, vol.86
, pp. 595-617
-
-
Stinson, D.R.1
Van Trung, T.2
Wei, R.3
-
39
-
-
0000589357
-
Some new bounds for cover-free families
-
Stinson, D.R., Wei, R., Zhu, L.: Some new bounds for cover-free families. Journal of Combinatorial Theory Series A 90, 224-234 (2000)
-
(2000)
Journal of Combinatorial Theory Series A
, vol.90
, pp. 224-234
-
-
Stinson, D.R.1
Wei, R.2
Zhu, L.3
-
40
-
-
2642560444
-
Attack on a concast signature scheme
-
Stinson, D.R.: Attack on a concast signature scheme. Information Processing Letters 91, 39-41 (2004)
-
(2004)
Information Processing Letters
, vol.91
, pp. 39-41
-
-
Stinson, D.R.1
-
41
-
-
84944483668
-
Group testing to eliminate efficiently all defectives in a binomial sample
-
Sobel, M., Groll, P.A.: Group testing to eliminate efficiently all defectives in a binomial sample. Bell System Tech. J. 28, 1179-1252 (1959)
-
(1959)
Bell System Tech. J.
, vol.28
, pp. 1179-1252
-
-
Sobel, M.1
Groll, P.A.2
|