Combinatorial solutions providing improved security for the generalized Russian cards problem
暂无分享,去创建一个
[1] P. Dembowski. Finite geometries , 1997 .
[2] Wiebe van der Hoek,et al. Model Checking Russian Cards , 2006, Electron. Notes Theor. Comput. Sci..
[3] Hans van Ditmarsch. The case of the hidden hand , 2005, J. Appl. Non Class. Logics.
[4] C. Colbourn,et al. The CRC handbook of combinatorial designs , edited by Charles J. Colbourn and Jeffrey H. Dinitz. Pp. 784. $89.95. 1996. ISBN 0-8493-8948-8 (CRC). , 1997, The Mathematical Gazette.
[5] Michael J. Fischer,et al. An Application of Game-Theoretic Techniques to Cryptography , 1990, Advances In Computational Complexity Theory.
[6] C. Aiswarya,et al. Lower Bound for the Communication Complexity of the Russian Cards Problem , 2008, ArXiv.
[7] Hans van Ditmarsch,et al. The Russian Cards Problem , 2003, Stud Logica.
[8] Takao Nishizeki,et al. A complete characterization of a family of key exchange protocols , 2002, International Journal of Information Security.
[9] Fernando Soler-Toscano,et al. Secure Communication of Local States in Interpreted Systems , 2011, DCAI.
[10] Fernando Soler-Toscano,et al. Three Steps , 2011, CLIMA.
[11] Leo G. Chouinard,et al. Partitions of the 4-subsets of a 13-set into disjoint projective planes , 1983, Discret. Math..
[12] Takao Nishizeki,et al. Necessary and Sufficient Numbers of Cards for the Transformation Protocol , 2004, COCOON.
[13] Zhenhua Duan,et al. Public Communication Based on Russian Cards Protocol: A Case Study , 2011, COCOA.
[14] Michael J. Fischer,et al. An efficient protocol for unconditionally secure secret key exchange , 1993, SODA '93.
[15] Michael J. Fischer,et al. Multiparty Secret Key Exchange Using a Random Deal of Cards , 1991, CRYPTO.
[16] Chen Yang,et al. Unconditional secure communication: a Russian Cards protocol , 2010, J. Comb. Optim..
[17] Michael J. Fischer,et al. Secret Bit Transmission Using a Random Deal of Cards , 1990, Distributed Computing And Cryptography.
[18] Fernando Soler-Toscano,et al. A secure additive protocol for card players , 2012, Australas. J Comb..
[19] Michael J. Fischer,et al. Bounds on secret key exchange using a random deal of cards , 2004, Journal of Cryptology.
[20] Mike D. Atkinson,et al. Avoiding bias in cards cryptography , 2007, Australas. J Comb..
[21] Mike D. Atkinson,et al. Safe communication for card players by combinatorial designs for two-step protocols , 2005, Australas. J Comb..