-
1
-
-
0002015048
-
Visual cryptography for general access structures
-
G. Ateniese, C. Blundo, A. D. Santis and D. R. Stinson, “Visual cryptography for general access structures”, in: Information and Computation, vol. 129, pp. 86–106 (1996).
-
(1996)
Information and Computation
, vol.129
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
Santis, A.D.3
Stinson, D.R.4
-
2
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
J. C. Benaloh and J. Leichter, “Generalized secret sharing and monotone functions”, in: Proc. of Crypto’88, Lecture Notes on Computer Science, LNCS vol. 403, pp. 27–36 (1990).
-
(1990)
Proc. Of Crypto’88, Lecture Notes on Computer Science, LNCS
, vol.403
, pp. 27-36
-
-
Benaloh, J.C.1
Leichter, J.2
-
3
-
-
0032116603
-
Visual cryptography schemes with perfect reconstruction of black pixels
-
C. Blundo and A. De. Santis, “Visual cryptography schemes with perfect reconstruction of black pixels”, in: Computer and Graphics, vol. 22, no. 4, pp. 449–455 (1998).
-
(1998)
Computer and Graphics
, vol.22
, Issue.4
, pp. 449-455
-
-
Blundo, C.1
Santis, A.2
-
4
-
-
0000437895
-
On the contrast in visual cryptography schemes
-
C. Blundo, A. De. Santis and D. R. Stinson, “On the contrast in visual cryptography schemes”, in: Journal of Cryptology, vol. 12, no. 4, pp. 261–289 (1999).
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 261-289
-
-
Blundo, C.1
Santis, A.2
Stinson, D.R.3
-
6
-
-
0035546454
-
Improved schemes for visual cryptography
-
C. Blundo, A. De. Bonis and A. De. Santis, “Improved schemes for visual cryptography”, in: Designs, Codes, and Cryptography, vol. 24, pp. 255–278 (2001).
-
(2001)
Designs, Codes, and Cryptography
, vol.24
, pp. 255-278
-
-
Blundo, C.1
Bonis, A.2
Santis, A.3
-
7
-
-
31244437258
-
Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels
-
P. A. Eisen and D. R. Stinson, “Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels”, in: Designs, Codes, and Cryptography, vol. 25, no. 1, pp. 15–61 (2002).
-
(2002)
Designs, Codes, and Cryptography
, vol.25
, Issue.1
, pp. 15-61
-
-
Eisen, P.A.1
Stinson, D.R.2
-
8
-
-
0027289776
-
Multiple assignment scheme for sharing secret
-
M. Itoh, A. Saito and T. Nishizeki, “Multiple assignment scheme for sharing secret”, in: Journal of Cryptology, vol. 6, no. 1, pp. 15–20 (1993)
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 15-20
-
-
Itoh, M.1
Saito, A.2
Nishizeki, T.3
-
9
-
-
84926193517
-
Visual cryptography
-
M. Naor and A. Shamir, “Visual cryptography”, in: Proc. of Eurocrypt’94, Lecture Notes on Computer Science, LNCS vol. 950, pp. 1–12 (1995).
-
(1995)
Proc. Of Eurocrypt’94, Lecture Notes on Computer Science, LNCS
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
10
-
-
84978983299
-
Visual cryptography II: Improving the Contrast Via the Cover Base
-
Full version
-
M. Naor and A. Shamir, “Visual cryptography II: Improving the Contrast Via the Cover Base”, in: Proc. of Security Protocols’96, Lecture Notes on Computer Science, LNCS vol. 1189, pp. 197–202 (1997). Full version available from http://www.wisdom.weizmann.ac.il/˜naor/PAPERS/newcov.ps.
-
(1997)
Proc. Of Security Protocols’96, Lecture Notes on Computer Science, LNCS
, vol.1189
, pp. 197-202
-
-
Naor, M.1
Shamir, A.2
-
11
-
-
0000049121
-
Constructions and properties of k out of n visual secret sharing schemes
-
E. R. Verheul and H. C. A. van Tilborg, “Constructions and properties of k out of n visual secret sharing schemes”, in: Designs, Codes, and Cryptography, vol. 11, no. 2, pp. 179–196 (1997).
-
(1997)
Designs, Codes, and Cryptography
, vol.11
, Issue.2
, pp. 179-196
-
-
Verheul, E.R.1
Van Tilborg, H.C.2
|