Author of the publication

Gradual and verifiable release of a secret

, , , and . Advances in Cryptology -- CRYPTO '87, volume 293 of Lecture Notes in Computer Science, page 156--166. Springer, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems., , and . CRYPTO, page 289-301. Plenum Press, New York, (1982)Fast Exponentiation with Precomputation (Extended Abstract)., , , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 200-207. Springer, (1992)On Privacy Homomorphisms (Extended Abstract)., and . EUROCRYPT, volume 304 of Lecture Notes in Computer Science, page 117-125. Springer, (1987)On the Classification of Idea Secret Sharing Schemes., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 278-285. Springer, (1989)A Survey of Hardware Implementation of RSA (Abstract).. CRYPTO, volume 435 of Lecture Notes in Computer Science, page 368-370. Springer, (1989)On the Structure of Minimum-Weight k-Connected Spanning Networks., , and . SIAM J. Discret. Math., 3 (3): 320-329 (1990)The Detection of Cheaters in Threshold Schemes., and . SIAM J. Discret. Math., 4 (4): 502-510 (1991)Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes., and . J. Cryptol., 5 (3): 153-166 (1992)Secure Audio Teleconference., , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 418-426. Springer, (1987)Gradual and Verifiable Release of a Secret., , , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 156-166. Springer, (1987)