Constructions and Bounds for Visual Cryptography
暂无分享,去创建一个
Alfredo De Santis | Douglas R. Stinson | Carlo Blundo | Giuseppe Ateniese | A. D. Santis | D. Stinson | G. Ateniese | C. Blundo
[1] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[2] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[3] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[4] Douglas R Stinson,et al. Some recursive constructions for perfect hash families , 1996 .
[5] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[6] Kurt Mehlhorn,et al. On the program size of perfect and universal hash functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[7] Richard M. Wilson,et al. A course in combinatorics , 1992 .
[8] J. Komlos,et al. On the Size of Separating Systems and Families of Perfect Hash Functions , 1984 .
[9] Peter Elias,et al. Zero error capacity under list decoding , 1988, IEEE Trans. Inf. Theory.