Results 41 to 50 of about 116 (50)
Probabilistic Infinite Secret Sharing
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core
Stream cipher based on quasigroup string transformations in $Z_p^*$
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core +1 more source
A New Watermarking Algorithm Based on Human Visual System for Content Integrity Verification of Region of Interest [PDF]
This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images.
Fatemizadeh, Emad, Maneshi, Mona
core +1 more source
Minimal Linear Codes Constructed from Sunflowers. [PDF]
Wu X, Lu W.
europepmc +1 more source
How to share secrets simultaneously [PDF]
Each member of a team consisting of $n$ person has a secret. The $k$ out of $n$ simultaneous threshold secret sharing requires that any group of $k$ members should be able to recover the secret of the other $n-k$ members, while any group of $k-1$ or less
Laszlo Csirmaz
core
Sum graph based access structure in a secret sharing scheme [PDF]
Secret sharing scheme is a method to distribute secret information to a set P of participants so that only authorised subsets of P can reconstruct the secret.
Miller, Mirka +2 more
core +1 more source
On the information ratio of graphs with many leaves [PDF]
Gyarmati, Máté, Ligeti, Péter
core +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
A case study in almost-perfect security for unconditionally secure communication [PDF]
core +1 more source

