Results 21 to 26 of about 31 (26)
Minimal Linear Codes Constructed from Sunflowers. [PDF]
Wu X, Lu W.
europepmc +1 more source
AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION
S. Srinivasan +2 more
semanticscholar +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
On Threshold secret sharing schemes with primary classes
Advanced Studies: Euro-Tbilisi Mathematical JournalThe aim of this paper is to study some specific classes of Threshold schemes. Our study is based on modular arithmetic and equivalence classes modulo a prime number. For this purpose we construct a secret sharing scheme by using these classes.
C. Ozel, H. Zekraoui
semanticscholar +1 more source
Remarks on the Classical Threshold Secret Sharing Schemes
Fundamenta Informaticae, 2012S. Spiez, M. Srebrny, J. Urbanowicz
semanticscholar +1 more source

