Incidence structures applied to cryptography
From MaRDI portal
Publication:1199628
DOI10.1016/0012-365X(92)90568-ZzbMath0757.94011OpenAlexW2069486748MaRDI QIDQ1199628
Publication date: 16 January 1993
Published in: Discrete Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/0012-365x(92)90568-z
securitysecret sharing schemescombinatorial designsauthentication schemesKey managementcommunications networkkey distribution patterns
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The combinatorics of authentication and secrecy codes
- Some constructions and bounds for authentication codes
- Key storage in secure networks
- The bank safe problem
- How to share a secret
- Authentication Theory/Coding Theory
- Some New Classes of Geometric Threshold Schemes
- A Combinatorial Approach to Threshold Schemes
- Codes Which Detect Deception
This page was built for publication: Incidence structures applied to cryptography