-
3
-
-
0000525949
-
Some recursive constructions for perfect hash families
-
M. Atici, S. S. Magliveras, D. R. Stinson, and W. D. Wei. Some recursive constructions for perfect hash families. Journal of Combinatorial Designs, (4):353-363, 1996.
-
(1996)
Journal of Combinatorial Designs
, Issue.4
, pp. 353-363
-
-
Atici, M.1
Magliveras, S.S.2
Stinson, D.R.3
Wei, W.D.4
-
5
-
-
84947917753
-
Efficient multiplicative sharing schemes
-
Advances in Cryptology-Eurocrypt '96
-
S. R. Blackburn, M. Burmester, Y. Desmedt, and P. R. Wild. Efficient multiplicative sharing schemes. Advances in Cryptology-Eurocrypt '96, LNCS, 1996:107-118.
-
(1996)
LNCS
, pp. 107-118
-
-
Blackburn, S.R.1
Burmester, M.2
Desmedt, Y.3
Wild, P.R.4
-
6
-
-
85028765277
-
Perfectly secure key distribution for dynamic conferences
-
Advances in Cryptology - Crypto 92
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly secure key distribution for dynamic conferences. Advances in Cryptology - Crypto 92, LNCS, 1993:471-486.
-
(1993)
LNCS
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
9
-
-
0029362456
-
On key storage in secure networks
-
M. Dyer, T. Fenner, A. Frieze, and A. Thomson. On key storage in secure networks. Journal of Cryptology, 8:189- 200, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomson, A.4
-
10
-
-
0000934255
-
Families of finite sets in which no set is covered by the union of two others
-
P. Erdös, P. Frankl, and Z. Furedi. Families of finite sets in which no set is covered by the union of two others. Journal of Combinatorial Theory, Series A, 33:158-166, 1982.
-
(1982)
Journal of Combinatorial Theory, Series A
, vol.33
, pp. 158-166
-
-
Erdös, P.1
Frankl, P.2
Furedi, Z.3
-
11
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of two others
-
P. Erdös, P. Frankl, and Z. Furedi. Families of finite sets in which no set is covered by the union of two others. Israel Journal of Mathematics, 51:79-89, 1985.
-
(1985)
Israel Journal of Mathematics
, vol.51
, pp. 79-89
-
-
Erdös, P.1
Frankl, P.2
Furedi, Z.3
-
12
-
-
84979291225
-
Broadcast encryption
-
Advances in Cryptology - Crypto '93
-
A. Fiat and M. Naor. Broadcast encryption. Advances in Cryptology - Crypto '93, LNCS, 773:480-491, 1994.
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
13
-
-
0030122596
-
Combinatorial bounds and design of broadcast authentication
-
H. Fujii, W. Kachen, and K. Kurosawa. Combinatorial bounds and design of broadcast authentication. IEICE Transactions, E 79(4):502-506, 1996.
-
(1996)
IEICE Transactions, E
, vol.79
, Issue.4
, pp. 502-506
-
-
Fujii, H.1
Kachen, W.2
Kurosawa, K.3
-
18
-
-
0002828874
-
Key distribution patterns using minkowski planes
-
C. M. O'Keefe. Key distribution patterns using minkowski planes. Designs, codes and Cryptography, 5:261-267, 1995.
-
(1995)
Designs, Codes and Cryptography
, vol.5
, pp. 261-267
-
-
O'Keefe, C.M.1
-
19
-
-
0002724154
-
Some constructions for key distribution patterns
-
K. A. S. Quinn. Some constructions for key distribution patterns. Designs, Codes and Cryptography, 4:177-191, 1994.
-
(1994)
Designs, Codes and Cryptography
, vol.4
, pp. 177-191
-
-
Quinn, K.A.S.1
-
20
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
D. R. Stinson. On some methods for unconditionally secure key distribution and broadcast encryption. Designs, Codes and Cryptography, 12:215-243, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
|