-
1
-
-
0020721991
-
A Modular Approach to Key Safeguarding
-
IT-29, 1983
-
Asmuth, A. and Bloom, J. (1983): "A Modular Approach to Key Safeguarding," IEEE Transactions on Information Theory, Vol. IT-29, 1983, pp. 208-210.
-
(1983)
IEEE Transactions on Information Theory
, pp. 208-210
-
-
Asmuth, A.1
Bloom, J.2
-
2
-
-
0001318089
-
Safeguarding Cryptographic Keys
-
1979
-
Blakley, G. R. (1979): "Safeguarding Cryptographic Keys," Proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies, Vol. 48, 1979, pp. 242-268.
-
(1979)
Proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies
, vol.48
, pp. 242-268
-
-
Blakley, G.R.1
-
3
-
-
84961369151
-
Security of Ramp Schemes
-
Springer-Verlag, Berlin, Heidelberg, 1984
-
Blakley, G. R. and Meadows, C. (1984): "Security of Ramp Schemes," Advances in Cryptology-Crypto '84, Springer-Verlag, Berlin, Heidelberg, 1984, pp. 242-268.
-
(1984)
Advances in Cryptology-Crypto '84
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
4
-
-
84948003090
-
Sharing a Dynamic Secret
-
Wyndham Paradise Vally Resort Scottsdale Arizona, U.S.A., April, 1992, 3.4.4.1-3.4.4.4
-
Chang, C. C. and Hwang, S. J. (1992): "Sharing a Dynamic Secret," IEEE International Phoenix Conference on Computer and Communications, Wyndham Paradise Vally Resort Scottsdale Arizona, U.S.A., April, 1992, pp. 3.4.4.1-3.4.4.4.
-
(1992)
IEEE International Phoenix Conference on Computer and Communications
-
-
Chang, C.C.1
Hwang, S.J.2
-
5
-
-
84947920747
-
Using the Discrete Logarithm for Dynamic (t, n) Secret Sharing Schemes
-
Charnes, Pieprzyk, and Safavi-Naini (1994): "Using the Discrete Logarithm for Dynamic (t, n) Secret Sharing Schemes", 2nd ACM Conference on Computer & Communication Security, 1994, pp. 89-95.
-
(1994)
2nd ACM Conference on Computer & Communication Security
, vol.1994
, pp. 89-95
-
-
Charnes, P.1
Safavi-Naini2
-
6
-
-
0017018484
-
New Directions in Cryptography
-
IT-22, 1976
-
Diffie, W. and Heilman, M. E. (1976): "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. IT-22, № 6, 1976, pp. 644-654.
-
(1976)
IEEE Transactions on Information Theory
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.E.2
-
7
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
IT-31, July 1985
-
El Gamal, T. (1985): "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory, Vol. IT-31, № 4, July 1985, pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
8
-
-
0028498073
-
Multistage Secret Sharing Based on One-way Function
-
September, 1994
-
He, J. and Dawson, E. (1994): "Multistage Secret Sharing Based on One-way Function," Electronics Letters, Vol. 30, № 19, September, 1994, pp. 1591-1592.
-
(1994)
Electronics Letters
, vol.30
, Issue.19
, pp. 1591-1592
-
-
He, J.1
Dawson, E.2
-
9
-
-
0029197220
-
Multisecret-Sharing Scheme Based on One Way Function
-
January, 1995
-
He, J. and Dawson, E. (1995): "Multisecret-Sharing Scheme Based on One Way Function," Electronics Letters, Vol. 31, № 2, January, 1995, pp. 93-95.
-
(1995)
Electronics Letters
, vol.31
, Issue.2
, pp. 93-95
-
-
He, J.1
Dawson, E.2
-
10
-
-
0030195519
-
An Efficient Dynamic Threshold Scheme
-
E79-D, 1996
-
Hwang, S. J., Chang, C. C. and Yang, W. P. (1995): "An Efficient Dynamic Threshold Scheme," IEICE TRANS. INF. & SYST., Vol. E79-D, № 7, 1996, pp. 936-942.
-
(1995)
IEICE TRANS. INF. & SYST.
, Issue.7
, pp. 936-942
-
-
Hwang, S.J.1
Chang, C.C.2
Yang, W.P.3
-
11
-
-
0020543282
-
On Secret Sharing Systems
-
IT-29, 1983
-
Karnin, E. D., Greene, J. W. and Heilman, H. E. (1983): "On Secret Sharing Systems," IEEE Transactions on Information Theory, Vol. IT-29, 1983, pp. 3541.
-
(1983)
IEEE Transactions on Information Theory
, pp. 3541
-
-
Karnin, E.D.1
Greene, J.W.2
Heilman, H.E.3
-
12
-
-
0003657590
-
-
Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, Mass, 1981
-
Knuth, D. (1981): The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, Mass, 1981.
-
(1981)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.1
-
13
-
-
38949129043
-
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space
-
Santa Barbara, California, U.S.A., August 1989
-
Laih, C., Ham, L., Lee, J. and Hwang, T. (1989): "Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space," Proceeding of Crypto '89, Santa Barbara, California, U.S.A., August 1989, pp. 20-24.
-
(1989)
Proceeding of Crypto '89
, pp. 20-24
-
-
Laih, C.1
Ham, L.2
Lee, J.3
Hwang, T.4
-
14
-
-
0018545449
-
How to Share a Secret
-
1979
-
Shamir, A. (1979): "How to Share a Secret," Communications of the Association for Computing Machinery, Vol. 22, № 11, 1979, pp. 612-613.
-
(1979)
Communications of the Association for Computing Machinery
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
84948003092
-
Key Management on Public-Key Cryptosystems and Threshold Schemes
-
Tainan, Taiwan, R.O.C., 1990
-
Sun, H. M. (1990): "Key Management on Public-Key Cryptosystems and Threshold Schemes," Master Thesis of Institute of Applied Mathematics, National Cheng Kung University, Tainan, Taiwan, R.O.C., 1990, pp. 36-67.
-
(1990)
Master Thesis of Institute of Applied Mathematics, National Cheng Kung University
, pp. 36-67
-
-
Sun, H.M.1
-
17
-
-
0028548565
-
Construction of Dynamic Threshold Schemes
-
November, 1995
-
Sun H. M. and Shieh, S. P. (1994b): "Construction of Dynamic Threshold Schemes", Electronics Letters, Vol. 30, № 24, November, 1995, pp. 2023-2024
-
(1994)
Electronics Letters
, vol.30
, Issue.24
, pp. 2023-2024
-
-
Sun, H.M.1
Shieh, S.P.2
-
18
-
-
84935531957
-
Relationship Between MDS Codes and Threshold Scheme
-
1988
-
Xain, Y. Y. (1988): "Relationship Between MDS Codes and Threshold Scheme," Electronics Letters, Vol. 24, № 3, 1988, pp. 154-156.
-
(1988)
Electronics Letters
, vol.24
, Issue.3
, pp. 154-156
-
-
Xain, Y.Y.1
-
19
-
-
0027969713
-
Reusing Shares in Secret Sharing Schemes
-
1994
-
Zheng, Y., Hardjono, T. and Seberry, J. (1994): "Reusing Shares in Secret Sharing Schemes," The Computer Journal, Vol. 37, № 3, 1994, pp. 200-205.
-
(1994)
The Computer Journal
, vol.37
, Issue.3
, pp. 200-205
-
-
Zheng, Y.1
Hardjono, T.2
Seberry, J.3
|