Security of Ramp Schemes
Top Cited Papers
- 24 November 2000
- book chapter
- Published by Springer Nature
- p. 242-268
- https://doi.org/10.1007/3-540-39568-7_20
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Wire-Tap Channel IIAT&T Bell Laboratories Technical Journal, 1984
- A modular approach to key safeguardingIEEE Transactions on Information Theory, 1983
- Secret Sharing SystemsPublished by Springer Nature ,1983
- Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of CommunicationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- On sharing secrets and Reed-Solomon codesCommunications of the ACM, 1981
- Security Proofs for Information Protection SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981
- An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystemsComputers & Mathematics with Applications, 1981
- One time Pads are Key Safegaurding Schemes, not Cryptosystems. Fast Key Safeguarding Schemes (Threshold Schemes) ExistPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Protecting Shared Cryptographic KeysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- How to share a secretCommunications of the ACM, 1979