Authenticated key distribution using given set of primes for secret sharing
暂无分享,去创建一个
N. Chandramowliswaran | S. Srinivasan | P. MuraliKrishna | S. Srinivasan | N. Chandramowliswaran | P. Muralikrishna
[1] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[4] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[6] T. Apostol. Introduction to analytic number theory , 1976 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[10] Eiji Okamoto,et al. Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..
[11] S. Srinivasan,et al. AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION , 2013 .
[12] R. Balakrishnan,et al. A textbook of graph theory , 1999 .