Found: 15
Select item for more details and to access through your institution.
Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 326, doi. 10.1049/iet-ifs.2017.0111
- By:
- Publication type:
- Article
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$({t,s,k,n})$ ‐ VESIS).
- Published in:
- IET Image Processing (Wiley-Blackwell), 2024, v. 18, n. 4, p. 1053, doi. 10.1049/ipr2.13006
- By:
- Publication type:
- Article
Identity - Based Multiple Key Agreement Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 12, p. 2392, doi. 10.3837/tiis.2011.12.007
- By:
- Publication type:
- Article
The complexity of the connected graph access structure on seven participants.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 1, p. 25, doi. 10.1515/jmc-2016-0017
- By:
- Publication type:
- Article
Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 2, p. 55, doi. 10.1515/jmc-2016-0054
- By:
- Publication type:
- Article
A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n)).
- Published in:
- CAAI Transactions on Intelligence Technology, 2024, v. 9, n. 2, p. 388, doi. 10.1049/cit2.12271
- By:
- Publication type:
- Article
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes.
- Published in:
- ISeCure, 2022, v. 14, n. 1, p. 1, doi. 10.22042/ISECURE.2021.272908.639
- By:
- Publication type:
- Article
Certificateless identification protocols from super singular elliptic curve.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 6, p. 979, doi. 10.1002/sec.815
- By:
- Publication type:
- Article
Perfect secret sharing schemes for graph access structures on six participants.
- Published in:
- Journal of Mathematical Cryptology, 2013, v. 7, n. 2, p. 143, doi. 10.1515/jmc-2012-0026
- By:
- Publication type:
- Article
Efficient multisecret sharing scheme using new proposed computational security model.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 1, p. n/a, doi. 10.1002/dac.3399
- By:
- Publication type:
- Article
Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem.
- Published in:
- Wireless Personal Communications, 2024, v. 137, n. 2, p. 1099, doi. 10.1007/s11277-024-11454-z
- By:
- Publication type:
- Article
A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure.
- Published in:
- Wireless Personal Communications, 2019, v. 104, n. 1, p. 491, doi. 10.1007/s11277-018-6032-7
- By:
- Publication type:
- Article
A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution.
- Published in:
- Wireless Personal Communications, 2016, v. 91, n. 3, p. 1459, doi. 10.1007/s11277-016-3539-7
- By:
- Publication type:
- Article
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 20, p. 58745, doi. 10.1007/s11042-023-17777-6
- By:
- Publication type:
- Article
OPTP: A new steganography scheme with high capacity and security.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 6, p. 17579, doi. 10.1007/s11042-023-16312-x
- By:
- Publication type:
- Article