Author:
Brickell Ernie,Di Crescenzo Giovanni,Frankel Yair
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Aiello, B., Bellare, M., Di Crescenzo, G., Venkatesan, R.: Security Amplification by Composition: the case of Doubly-Iterated, Ideal Ciphers. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 390. Springer, Heidelberg (1998)
2. Boyd, C.: Digital Multisignatures. In: Proc. of IMA Conference on Cryptography and Coding. Claredon Press (1989)
3. Lecture Notes in Computer Science;J.C. Benaloh,1990
4. Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proc. of Nat. Computer Conf. AFIPS 1979 (1979)
5. Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the Size of Shares for Secret Sharing Schemes. Journal of Cryptology 6, 57–167 (1993)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献