On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Cryptography, a Primer
Proceedings of the 1982 conference on Cryptography
Using algorithms as keys in stream ciphers
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Smallest possible message expansion in threshold schemes
Proceedings on Advances in cryptology---CRYPTO '86
How to (really) share a secret
CRYPTO '88 Proceedings on Advances in cryptology
Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space
CRYPTO '89 Proceedings on Advances in cryptology
Nonperfect secret sharing schemes and matroids
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A General Decomposition Construction for Incomplete SecretSharing Schemes
Designs, Codes and Cryptography
Changing Thresholds in the Absence of Secure Channels
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Information Theory Without the Finiteness Assumption, II: Unfolding the DES
CRYPTO '85 Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Non-perfect Secret Sharing over General Access Structures
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
A ramp model for distributed key distribution schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Shared generation of pseudo-random functions
Journal of Complexity - Special issue on coding and cryptography
Strongly secure ramp secret sharing schemes for general access structures
Information Processing Letters
A Strong Ramp Secret Sharing Scheme Using Matrix Projection
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Generalised Cumulative Arrays in Secret Sharing
Designs, Codes and Cryptography
Secret sharing schemes with partial broadcast channels
Designs, Codes and Cryptography
Properties and constraints of cheating-immune secret sharing schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
New results on non-perfect sharing of multiple secrets
Journal of Systems and Software
Secure Computation from Random Error Correcting Codes
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
ISC '08 Proceedings of the 11th international conference on Information Security
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On a Fast (k,n)-Threshold Secret Sharing Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Strongly Secure Linear Network Coding
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Invertible extractors and wiretap protocols
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Properties and constraints of cheating-immune secret sharing schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Strongly secure ramp secret sharing schemes for general access structures
Information Processing Letters
An efficient dispersal and encryption scheme for secure distributed information storage
ICCS'03 Proceedings of the 2003 international conference on Computational science
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Authenticated data structures for graph and geometric searching
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Strongly multiplicative ramp schemes from high degree rational points on curves
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Crypto topics and applications II
Algorithms and theory of computation handbook
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
Ideal secret sharing schemes with share selectability
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Threshold implementations against side-channel attacks and glitches
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
All sail, no anchor III: risk aggregation and time's arrow
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
SP'04 Proceedings of the 12th international conference on Security Protocols
Information theory and the security of binary data perturbation
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Efficient (n, t, n) secret sharing schemes
Journal of Systems and Software
Secure computation, i/o-efficient algorithms and distributed signatures
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
Optimum general threshold secret sharing
ICITS'12 Proceedings of the 6th international conference on Information Theoretic Security
Revisiting a secret sharing approach to network codes
ProvSec'12 Proceedings of the 6th international conference on Provable Security
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
Cryptography and Communications
Hi-index | 0.00 |