-
1
-
-
0018545449
-
How to share a secret
-
A.Shamir, How to share a secret, Comm.ACM, 22(1979), pp.612-613.
-
(1979)
Comm.ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
3
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R.J.McEliece and D.V.Sarwate, On sharing secrets and Reed-Solomon codes, Comm.ACM, 24(1981), pp.583-584.
-
(1981)
Comm.ACM
, vol.24
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
4
-
-
0005180192
-
Robust shared secret schemes or "how to be sure you have the right answer even though you don't know the question"
-
G.Simmons, Robust shared secret schemes or "how to be sure you have the right answer even though you don't know the question," Congr.Numer., 68(1989), pp.215- 248.
-
(1989)
Congr.Numer
, vol.68
, pp. 215-248
-
-
Simmons, G.1
-
6
-
-
0005167951
-
The Detection of Cheaters in Threshold Schemes
-
Nov
-
E.F.Brickell and D.R.Stinson, The Detection of Cheaters in Threshold Schemes, SIAM J. DISC. MATH, Vol.4, No.4, Nov.1991, pp.502-510.
-
(1991)
SIAM J. DISC. MATH
, vol.4
, Issue.4
, pp. 502-510
-
-
Brickell, E.F.1
Stinson, D.R.2
-
7
-
-
0024141971
-
How to share a secret with cheaters
-
M.Tompa and H.Woll, How to share a secret with cheaters, Journal of Cryptology, vol.l(1988), pp.133-138.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
8
-
-
85028775273
-
Size of Shares and Probability of Cheating in Threshold Schemes
-
Lecture Notes in Computer Science, LNCS 765, Springer Verlag
-
Marco Carpentieri, Alfredo De Santis and Ugo Vaccaro, Size of Shares and Probability of Cheating in Threshold Schemes, Proceedings of Eurocrypt'93, Lecture Notes in Computer Science, LNCS 765, Springer Verlag (1993), pp.118-125.
-
(1993)
Proceedings of Eurocrypt'93
, pp. 118-125
-
-
Carpentieri, M.1
De Santis, A.2
Vaccaro, U.3
-
9
-
-
0020543282
-
On Secret Sharing Systems
-
E.D.Karnin, J.W.Greene, and M.E.Hellman, On Secret Sharing Systems, IEEE Trans, on Inform. Theory, Vol.IT-29 (1983), pp.35-41.
-
(1983)
IEEE Trans, on Inform. Theory
, vol.IT-29
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
10
-
-
85029546799
-
On the size of shares for secret sharing schemes
-
Lecture Notes in Computer Science, LNCS 576, Springer Verlag
-
R.M.Capocelli, A.De Santis, L.Gargano and U.Vaccaro, On the size of shares for secret sharing schemes, Proceedings of Crypto'91, Lecture Notes in Computer Science, LNCS 576, Springer Verlag (1991), pp.101-113.
-
(1991)
Proceedings of Crypto'91
, pp. 101-113
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
11
-
-
84957645204
-
Combinatorial interpretation of secret sharing schemes
-
K.Kurosawa and K.Okada, Combinatorial interpretation of secret sharing schemes, In Pre-Proceedings of Asiacrypt'94 (1994), pp.38-48.
-
(1994)
Pre-Proceedings of Asiacrypt'94
, pp. 38-48
-
-
Kurosawa, K.1
Okada, K.2
-
12
-
-
0003038453
-
A survey of Information Authentication, in Contemporary Cryptology
-
ed. G.J.Simmons, IEEE Press, New York
-
G.J.Simmons, A survey of Information Authentication, in Contemporary Cryptology, The science of information integrity, ed. G.J.Simmons, IEEE Press, New York (1992).
-
(1992)
The science of information integrity
-
-
Simmons, G.J.1
-
13
-
-
0347818475
-
Message authentication: A game on hypergraphs
-
G.J.Simmons, Message authentication: a game on hypergraphs, Congr. Numer. 45 (1984), pp.161-192.
-
(1984)
Congr. Numer
, vol.45
, pp. 161-192
-
-
Simmons, G.J.1
-
14
-
-
0023828936
-
Some constructions and bounds for authentication codes
-
D.R.Stinson, Some constructions and bounds for authentication codes, Journal of Cryptology, vol.l (1988), pp.37-51.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 37-51
-
-
Stinson, D.R.1
-
15
-
-
0022953155
-
Cryptography - A selective survey
-
North- Holland (pub.)
-
J.L.Massey, Cryptography - a selective survey, in Digital Communications, North- Holland (pub.) (1986), pp.3-21.
-
(1986)
Digital Communications
, pp. 3-21
-
-
Massey, J.L.1
-
16
-
-
0025724776
-
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting
-
M.De Soete, New Bounds and Constructions for Authentication/Secrecy Codes with Splitting, Journal of Cryptology, vol.3, no.3 (1991), pp.173-186.
-
(1991)
Journal of Cryptology
, vol.3
, Issue.3
, pp. 173-186
-
-
De Soete, M.1
|