-
1
-
-
0000525949
-
-
M. Atici, S.S. Magliveras, D. R. Stinson and W.D. Wei, Some Recursive Constructions for Perfect Hash Families. Journal of Combinatorial Designs 4(1996), 353-363. 408
-
(1996)
Ome Recursive Constructions for Perfect Hash Families
, vol.4-408
, pp. 353-363
-
-
Atici, M.1
Magliveras, S.S.2
Stinson, D.R.3
Wei, W.D.4
-
2
-
-
35048891868
-
Key hash functions for message authentication, in
-
M. Bellare, R. Canetti and H. Krawczyk, Key hash functions for message authentication, in Advance in Cryptology–Crypto’96, LNCS, 1109(1996), 1-15.
-
(1996)
Advance in Cryptology–Crypto’96, LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
0345952600
-
Combinatorics and Threshold Cryptology
-
Chapman & Hall/CRC Res. Notes Mat
-
S. R. Blackburn, Combinatorics and Threshold Cryptology, in Combinatorial Designs and their Applications, Chapman & Hall/CRC Res. Notes Math. Vol. 403(1997), 49-70. 407, 408
-
(1997)
Combinatorial Designs and Their Applications
, vol.403
, pp. 49-70
-
-
Blackburn, S.R.1
-
4
-
-
84947917753
-
Efficient multiplicative sharing schemes
-
S. R. Blackburn, M. Burmester, Y. Desmedt and P. R. Wild, “Efficient multiplicative sharing schemes,” in Advance in Cryptology–Eurocrypt’96, LNCS, 1070(1996), 107-118. 407
-
(1996)
Advance in Cryptology–Eurocrypt’96, LNCS
, pp. 107-118
-
-
Blackburn, S.R.1
Burmester, M.2
Desmedt, Y.3
Wild, P.R.4
-
6
-
-
85028765277
-
Perfectly secure key distribution for dynamic conferences
-
Advances in Cryptology – CRYPTO’92
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly secure key distribution for dynamic conferences. Lecture Notes in Computer Science 740(1993), 471-486 (Advances in Cryptology – CRYPTO’92) 401, 408
-
(1993)
Lecture Notes in Computer Science
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
8
-
-
0026992399
-
Multi-receiver/Multi-sender network security
-
efficient authenticated multicast/feedback
-
Y. Desmedt, Y. Frankel and M. Yung, Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback, IEEE Infocom’92, (1992) 2045-2054. 400, 402, 406
-
(1992)
IEEE Infocom’92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
10
-
-
84979291225
-
Broadcast Encryption. In “Advances in Cryptology – Crypto’93”
-
A. Fiat and M. Naor, Broadcast Encryption. In “Advances in Cryptology – Crypto’93”, Lecture Notes in Computer Science 773 (1994), 480-491. 407, 408
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
0030122596
-
Combinatorial bounds and design of broadcast authentication
-
H. Fujii, W. Kachen and K. Kurosawa, Combinatorial bounds and design of broadcast authentication, IEICE Trans., VolE79-A, No. 4(1996)502-506. 402
-
(1996)
IEICE Trans.
, Issue.4
, pp. 502-506
-
-
Fujii, H.1
Kachen, W.2
Kurosawa, K.3
-
12
-
-
0025212474
-
A matrix key-distribution scheme
-
L. Gong and D. J. Wheeler, A matrix key-distribution scheme. J. Cryptology, Vol.2(1990), 51-59. 404
-
(1990)
J. Cryptology
, vol.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
13
-
-
84957875373
-
Characterization of (K, n) multi-receiver authentication
-
Lecture Notes in Comput. Sci
-
K. Kurosawa and S. Obana, Characterization of (k, n) multi-receiver authentication, Information Security and Privacy, ACISP’97, Lecture Notes in Comput. Sci. 1270,(1997) 204-215. 402
-
(1997)
Information Security and Privacy
, vol.402
, pp. 204-215
-
-
Kurosawa, K.1
Obana, S.2
-
14
-
-
0002874527
-
Incidence structures for key sharing
-
(Advances in Cryptology–Asiacrypt’94)
-
T. Matsumoto, Incidence structures for key sharing, Lecture Notes in Computer Science 917(1995), 242-253(Advances in Cryptology–Asiacrypt’94). 404
-
(1995)
Lecture Notes in Computer Science
, pp. 242-253
-
-
Matsumoto, T.1
-
17
-
-
0002828874
-
Key distribution patterns using Minkowski planes.Designs
-
C. M. O’Keefe, Key distribution patterns using Minkowski planes.Designs, Codes and Cryptography 5(1995) 261-267. 404
-
Codes and Cryptography
, vol.404
, pp. 261-267
-
-
O’ Keefe, C.M.1
-
18
-
-
84957715332
-
New results on multi-receiver authentication code
-
Lecture Notes in Computer Science
-
R. Safavi-Naini and H. Wang, New results on multi-receiver authentication codes, Advances in Cryptology – Eurocrypt’98, Lecture Notes in Computer Science, 1438(1998), 527-541. 400, 401, 402, 404
-
(1998)
Advances in Cryptology – Eurocrypt’98
, pp. 527-541
-
-
Safavi-Naini, R.1
Wang, H.2
-
20
-
-
0001531989
-
Multireceiver authentication codes: Models, bounds, constructions and extensions
-
R. Safavi-Naini and H. Wang, Multireceiver authentication codes: models, bounds, constructions and extensions, Information and Computation 151(1999), 148-172 401, 404
-
(1999)
Information and Computation
, pp. 148-172
-
-
Safavi-Naini, R.1
Wang, H.2
-
21
-
-
0003959092
-
-
G.J. Simmons, ed., IEEE Press
-
G. J. Simmons, A survey of information authentication, in Contemporary Cryptol-ogy, The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, (1992), 379-419.
-
(1992)
Survey of information authentication
, pp. 379-419
-
-
Simmons, G.J.1
-
22
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
D. R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption. Designs, Codes and Cryptography, 12(1997), 215-243. 404, 408
-
(1997)
Designs, Codes and Cryptography
, pp. 215-243
-
-
Stinson, D.R.1
-
23
-
-
0002808611
-
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
-
D. R. Stinson, T. van Trung and R. Wei, Secure frameproof codes, key distribution patterns, group testing algorithms and related structures, J. Statist. Plan. Infer., to appear. 401, 404
-
J. Statist. Plan. Infer., to Appear.
, vol.401-404
-
-
Stinson, D.R.1
Van Trung, T.2
Wei, R.3
|