Bounds And Constructions For Threshold Shared Generation Of Authenticators
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3577144 (Why is no real title available?)
- scientific article; zbMATH DE number 1228785 (Why is no real title available?)
- A shift register construction of unconditionally secure authentication codes
- An explication of secret sharing schemes
- Codes Which Detect Deception
- Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions
- Efficient Multiplicative Sharing Schemes
- How to share a secret
- On secret sharing systems
- Perfect hashing
- The combinatorics of authentication and secrecy codes
- Unconditionally secure group authentication
This page was built for publication: Bounds And Constructions For Threshold Shared Generation Of Authenticators
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4792963)