Author:
Safavi-Naini Rei,Wang Huaxiong
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Atici, M., Magliveras, S.S., Stinson, D.R., Wei, W.D.: Some Recursive Constructions for Perfect Hash Families. Journal of Combinatorial Designs 4, 353–363 (1996)
2. Bellare, M., Canetti, R., Krawczyk, H.: Key hash functions for message authentication. In: Advance in Cryptology–Crypto 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
3. Blackburn, S.R.: Combinatorics and Threshold Cryptology, in Combinatorial Designs and their Applications, Chapman & Hall/CRC Res. Notes Math 403, 49–70 (1997)
4. Lecture Notes in Computer Science;S.R. Blackburn,1996
5. Blackburn, S.R., Wild, P.R.: Optimal linear perfect hash families. J. Comb. Theory - Series A 83, 233–250 (1998)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献