期刊文献+

Secret Sharing Based on the Residue Theorem

Secret Sharing Based on the Residue Theorem
下载PDF
导出
出处 《通讯和计算机(中英文版)》 2012年第2期148-154,共7页 Journal of Communication and Computer
关键词 秘密共享 留数定理 秘密信息 加密方法 保护措施 共享存储 剩余定理 最佳解 Secret sharing, data protection, user identification.
  • 相关文献

参考文献7

  • 1P. Antonov, Cryptography in Computer Communications, Varna, 2000.
  • 2A. Beimel, B.B. Chor, Universally ideal secret sharing schemes, IEEE Transactions on Information Theory 40 (1994) 786-794.
  • 3R. Petrov, Information Protection in Computers and Networks, Sofia, 2002.
  • 4W. Stallings, Cryptography and Network Security, Prentice Hall, New Jersey, 2001.
  • 5R. Ahlswede, Common randomness in information theory and cryptography secret sharing, IEEE Transactions on Information Theory 39 (1993) 1121-1132.
  • 6A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
  • 7B. Schneier, Applied Cryptography, Protocols, Algorithms and Source Code in C, John Wiley & Sons Inc, 1996.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部