-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
G.R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings 48 (1979) 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
0001003172
-
Tight Bounds on the Information Hate of Secret Sharing Schemes
-
C. Blundo, A. De Santis, L. Gargano, U. Vaccaro. Tight Bounds on the Information Hate of Secret Sharing Schemes. Designs, Codes and Cryptography 11 (1997) 107-122.
-
(1997)
Designs, Codes and Cryptography
, vol.11
, pp. 107-122
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
7
-
-
0000849681
-
On the Classification of Ideal Secret Sharing Schemes
-
E. F. Brickell, D. M. Davenport. On the Classification of Ideal Secret Sharing Schemes. J. Cryptology 4 (1991) 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
8
-
-
0026992660
-
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
-
E.F. Brickell and D.R. Stinson. Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. J. Cryptology 5 (1992) 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
9
-
-
85029546799
-
On the Size of Shares of Secret Sharing Schemes
-
Lecture Notes in Computer Science 576, Springer-Verlag, To appear in J. Of Cryptology
-
R. M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro. On the Size of Shares of Secret Sharing Schemes. In Advances in Cryptology-CRYPTO 91, Lecture Notes in Computer Science 576, Springer-Verlag, 101-113. To appear in J. Of Cryptology.
-
Advances in Cryptology-CRYPTO 91
, pp. 101-113
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. of the ACM 22 (1979) 612-613.
-
(1979)
Commun. Of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
0003038453
-
An Introduction to Shared Secret and/or Shared Control Schemes and Their Application
-
IEEE Press
-
G.J. Simmons. An Introduction to Shared Secret and/or Shared Control Schemes and Their Application. Contemporary Cryptology. The Science of Information Integrity. IEEE Press (1991) 441-497.
-
(1991)
Contemporary Cryptology. The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
14
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography 2 (1992) 357-390.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
15
-
-
0028323999
-
Decomposition Constructions for Secret-Sharing Schemes
-
D.R. Stinson. Decomposition Constructions for Secret-Sharing Schemes. IEEE Trans, on Information Theory 40 (1994) 118-125.
-
(1994)
IEEE Trans, on Information Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
|