Henry, Kevin J.; Stinson, Douglas R. Linear approaches to resilient aggregation in sensor networks. (English) Zbl 1403.94063 J. Math. Cryptol. 9, No. 4, 245-272 (2015). MSC: 94A60 94A12 PDFBibTeX XMLCite \textit{K. J. Henry} and \textit{D. R. Stinson}, J. Math. Cryptol. 9, No. 4, 245--272 (2015; Zbl 1403.94063) Full Text: DOI
Paterson, Maura B.; Stinson, Douglas R. Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. (English) Zbl 1403.94073 J. Math. Cryptol. 9, No. 4, 215-225 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. B. Paterson} and \textit{D. R. Stinson}, J. Math. Cryptol. 9, No. 4, 215--225 (2015; Zbl 1403.94073) Full Text: DOI arXiv Link
Swanson, Colleen M.; Stinson, Douglas R. Extended results on privacy against coalitions of users in user-private information retrieval protocols. (English) Zbl 1341.68042 Cryptogr. Commun. 7, No. 4, 415-437 (2015). MSC: 68P20 05B05 94A60 94A62 PDFBibTeX XMLCite \textit{C. M. Swanson} and \textit{D. R. Stinson}, Cryptogr. Commun. 7, No. 4, 415--437 (2015; Zbl 1341.68042) Full Text: DOI
Guo, Chuan; Stinson, Douglas R.; van Trung, Tran On tight bounds for binary frameproof codes. (English) Zbl 1336.94050 Des. Codes Cryptography 77, No. 2-3, 301-319 (2015). MSC: 94A60 94B60 PDFBibTeX XMLCite \textit{C. Guo} et al., Des. Codes Cryptography 77, No. 2--3, 301--319 (2015; Zbl 1336.94050) Full Text: DOI arXiv
Henry, Kevin; Paterson, Maura B.; Stinson, Douglas R. Practical approaches to varying network size in combinatorial key predistribution schemes. (English) Zbl 1321.94146 Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 89-117 (2014). MSC: 94C30 94A60 68R05 05B05 PDFBibTeX XMLCite \textit{K. Henry} et al., Lect. Notes Comput. Sci. 8282, 89--117 (2014; Zbl 1321.94146) Full Text: DOI
Swanson, Colleen M.; Stinson, Douglas R. Additional constructions to solve the generalized Russian cards problem using combinatorial designs. (English) Zbl 1408.94965 Electron. J. Comb. 21, No. 3, Research Paper P3.29, 31 p. (2014). MSC: 94A60 05B05 PDFBibTeX XMLCite \textit{C. M. Swanson} and \textit{D. R. Stinson}, Electron. J. Comb. 21, No. 3, Research Paper P3.29, 31 p. (2014; Zbl 1408.94965) Full Text: arXiv Link
Stinson, Douglas R.; Upadhyay, Jalaj Is extracting data the same as possessing data? (English) Zbl 1330.94049 J. Math. Cryptol. 8, No. 2, 189-207 (2014). MSC: 94A60 68P20 68P25 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{J. Upadhyay}, J. Math. Cryptol. 8, No. 2, 189--207 (2014; Zbl 1330.94049) Full Text: DOI
Swanson, C. M.; Stinson, D. R. Combinatorial solutions providing improved security for the generalized Russian cards problem. (English) Zbl 1293.05021 Des. Codes Cryptography 72, No. 2, 345-367 (2014). MSC: 05B05 94A60 PDFBibTeX XMLCite \textit{C. M. Swanson} and \textit{D. R. Stinson}, Des. Codes Cryptography 72, No. 2, 345--367 (2014; Zbl 1293.05021) Full Text: DOI arXiv
Paterson, Maura B.; Stinson, Douglas R. A unified approach to combinatorial key predistribution schemes for sensor networks. (English) Zbl 1306.94083 Des. Codes Cryptography 71, No. 3, 433-457 (2014). Reviewer: Charles J. Colbourn (Tempe) MSC: 94A60 05B15 05B25 94C30 PDFBibTeX XMLCite \textit{M. B. Paterson} and \textit{D. R. Stinson}, Des. Codes Cryptography 71, No. 3, 433--457 (2014; Zbl 1306.94083) Full Text: DOI Link
Paterson, Maura B.; Stinson, Douglas R. A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. (English) Zbl 1283.94078 Cryptogr. Commun. 5, No. 4, 229-240 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{M. B. Paterson} and \textit{D. R. Stinson}, Cryptogr. Commun. 5, No. 4, 229--240 (2013; Zbl 1283.94078) Full Text: DOI Link
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. (English) Zbl 1283.94079 J. Math. Cryptol. 7, No. 3, 183-216 (2013). MSC: 94A60 68M12 68P20 PDFBibTeX XMLCite \textit{M. B. Paterson} et al., J. Math. Cryptol. 7, No. 3, 183--216 (2013; Zbl 1283.94079) Full Text: DOI arXiv Link OA License
Nojoumian, Mehrdad; Stinson, Douglas R. On dealer-free dynamic threshold schemes. (English) Zbl 1317.94131 Adv. Math. Commun. 7, No. 1, 39-56 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Nojoumian} and \textit{D. R. Stinson}, Adv. Math. Commun. 7, No. 1, 39--56 (2013; Zbl 1317.94131) Full Text: DOI
Swanson, Colleen M.; Stinson, Douglas R. Extended combinatorial constructions for peer-to-peer user-private information retrieval. (English) Zbl 1282.94069 Adv. Math. Commun. 6, No. 4, 479-497 (2012). MSC: 94A60 05B05 PDFBibTeX XMLCite \textit{C. M. Swanson} and \textit{D. R. Stinson}, Adv. Math. Commun. 6, No. 4, 479--497 (2012; Zbl 1282.94069) Full Text: DOI arXiv OA License
Nojoumian, Mehrdad; Stinson, Douglas R. Socio-rational secret sharing as a new direction in rational cryptography. (English) Zbl 1283.94099 Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 18-37 (2012). MSC: 94A62 91A35 91A80 PDFBibTeX XMLCite \textit{M. Nojoumian} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 7638, 18--37 (2012; Zbl 1283.94099) Full Text: DOI
Blackburn, Simon R.; Stinson, Douglas R.; Upadhyay, Jalaj On the complexity of the herding attack and some related attacks on hash functions. (English) Zbl 1241.05131 Des. Codes Cryptography 64, No. 1-2, 171-193 (2012). MSC: 05C80 68Q17 94A60 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., Des. Codes Cryptography 64, No. 1--2, 171--193 (2012; Zbl 1241.05131) Full Text: DOI
Martin, Keith M.; Paterson, Maura B.; Stinson, Douglas R. Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. (English) Zbl 1235.94056 Cryptogr. Commun. 3, No. 2, 65-86 (2011). MSC: 94A62 94B05 PDFBibTeX XMLCite \textit{K. M. Martin} et al., Cryptogr. Commun. 3, No. 2, 65--86 (2011; Zbl 1235.94056) Full Text: DOI
Zaverucha, Gregory M.; Stinson, Douglas R. Short one-time signatures. (English) Zbl 1248.94099 Adv. Math. Commun. 5, No. 3, 473-488 (2011). MSC: 94A60 05B40 94A62 PDFBibTeX XMLCite \textit{G. M. Zaverucha} and \textit{D. R. Stinson}, Adv. Math. Commun. 5, No. 3, 473--488 (2011; Zbl 1248.94099) Full Text: DOI OA License
Swanson, Colleen M.; Stinson, Douglas R. Unconditionally secure signature schemes revisited. (English) Zbl 1295.94189 Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 100-116 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{C. M. Swanson} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 6673, 100--116 (2011; Zbl 1295.94189) Full Text: DOI
Biryukov, Alex (ed.); Gong, Guang (ed.); Stinson, Douglas R. (ed.) Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. (English) Zbl 1208.94008 Lecture Notes in Computer Science 6544. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). xiii, 411 p. (2011). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{A. Biryukov} (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12--13, 2010. Revised selected papers. Berlin: Springer (2011; Zbl 1208.94008) Full Text: DOI
Goldberg, Ian; Mashatan, Atefeh; Stinson, Douglas R. On message recognition protocols: recoverability and explicit confirmation. (English) Zbl 1208.94044 Int. J. Appl. Cryptogr. 2, No. 2, 100-120 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Goldberg} et al., Int. J. Appl. Cryptogr. 2, No. 2, 100--120 (2010; Zbl 1208.94044) Full Text: DOI
Zaverucha, Gregory M.; Stinson, Douglas R. Group testing and batch verification. (English) Zbl 1282.94073 Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 140-157 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{G. M. Zaverucha} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 5973, 140--157 (2010; Zbl 1282.94073) Full Text: DOI
Zaverucha, Gregory M.; Stinson, Douglas R. Anonymity in shared symmetric key primitives. (English) Zbl 1201.94106 Des. Codes Cryptography 57, No. 2, 139-160 (2010). Reviewer: Bal Kishan Dass (Delhi) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. M. Zaverucha} and \textit{D. R. Stinson}, Des. Codes Cryptography 57, No. 2, 139--160 (2010; Zbl 1201.94106) Full Text: DOI
Mashatan, Atefeh; Stinson, Douglas R. Practical unconditionally secure two-channel message authentication. (English) Zbl 1220.94050 Des. Codes Cryptography 55, No. 2-3, 169-188 (2010). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{A. Mashatan} and \textit{D. R. Stinson}, Des. Codes Cryptography 55, No. 2--3, 169--188 (2010; Zbl 1220.94050) Full Text: DOI
Wu, J.; Stinson, D. R. An efficient identification protocol secure against concurrent-reset attacks. (English) Zbl 1185.94067 J. Math. Cryptol. 3, No. 4, 339-352 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Wu} and \textit{D. R. Stinson}, J. Math. Cryptol. 3, No. 4, 339--352 (2009; Zbl 1185.94067) Full Text: DOI
Wu, Jiang; Stinson, Douglas R. A highly scalable RFID authentication protocol. (English) Zbl 1284.94147 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 360-376 (2009). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{J. Wu} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 5594, 360--376 (2009; Zbl 1284.94147) Full Text: DOI
Sui, Jiayuan; Stinson, Douglas R. A critical analysis and improvement of advanced access content system drive-host authentication. (English) Zbl 1159.94371 Int. J. Appl. Cryptogr. 1, No. 3, 169-180 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Sui} and \textit{D. R. Stinson}, Int. J. Appl. Cryptogr. 1, No. 3, 169--180 (2009; Zbl 1159.94371) Full Text: DOI
Cao, H.; Dinitz, J.; Kreher, D.; Stinson, D. R.; Wei, R. On orthogonal generalized equitable rectangles. (English) Zbl 1283.05042 Des. Codes Cryptography 51, No. 3, 225-230 (2009). MSC: 05B15 94A60 PDFBibTeX XMLCite \textit{H. Cao} et al., Des. Codes Cryptography 51, No. 3, 225--230 (2009; Zbl 1283.05042) Full Text: DOI
Paterson, M. B.; Stinson, D. R. Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. (English) Zbl 1156.94372 J. Math. Cryptol. 2, No. 4, 393-403 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. B. Paterson} and \textit{D. R. Stinson}, J. Math. Cryptol. 2, No. 4, 393--403 (2008; Zbl 1156.94372) Full Text: DOI
Stinson, Douglas R.; Zaverucha, Gregory M. Some improved bounds for secure frameproof codes and related separating hash families. (English) Zbl 1304.94110 IEEE Trans. Inf. Theory 54, No. 6, 2508-2514 (2008). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{G. M. Zaverucha}, IEEE Trans. Inf. Theory 54, No. 6, 2508--2514 (2008; Zbl 1304.94110) Full Text: DOI
Blackburn, Simon R.; Martin, Keith M.; Paterson, Maura B.; Stinson, Douglas R. Key refreshing in wireless sensor networks. (English) Zbl 1162.94342 Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 156-170 (2008). MSC: 94A60 68M14 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., Lect. Notes Comput. Sci. 5155, 156--170 (2008; Zbl 1162.94342) Full Text: DOI
Sui, Jiayuan; Stinson, Douglas R. A critical analysis and improvement of AACS drive-host authentication. (English) Zbl 1279.94139 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 37-52 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Sui} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 5107, 37--52 (2008; Zbl 1279.94139) Full Text: DOI
Sunar, Berk; Martin, William J.; Stinson, Douglas R. A provably secure true random number generator with built-in tolerance to active attacks. (English) Zbl 1391.94799 IEEE Trans. Comput. 56, No. 1, 109-119 (2007). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{B. Sunar} et al., IEEE Trans. Comput. 56, No. 1, 109--119 (2007; Zbl 1391.94799) Full Text: DOI
Stinson, Douglas R. Unconditionally secure chaffing and winnowing with short authentication tags. (English) Zbl 1207.94065 Adv. Math. Commun. 1, No. 2, 269-280 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, Adv. Math. Commun. 1, No. 2, 269--280 (2007; Zbl 1207.94065) Full Text: DOI OA License
Stinson, D. R. Generalized mix functions and orthogonal equitable rectangles. (English) Zbl 1179.05022 Des. Codes Cryptography 45, No. 3, 347-357 (2007). MSC: 05B15 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, Des. Codes Cryptography 45, No. 3, 347--357 (2007; Zbl 1179.05022) Full Text: DOI
Nandi, Mridul; Stinson, Douglas R. Multicollision attacks on some generalized sequential hash functions. (English) Zbl 1310.94163 IEEE Trans. Inf. Theory 53, No. 2, 759-767 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Nandi} and \textit{D. R. Stinson}, IEEE Trans. Inf. Theory 53, No. 2, 759--767 (2007; Zbl 1310.94163) Full Text: DOI
Stinson, Douglas R.; Zhang, Sheng Algorithms for detecting cheaters in threshold schemes. (English) Zbl 1135.94334 J. Comb. Math. Comb. Comput. 61, 169-191 (2007). MSC: 94A62 05B40 68P25 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{S. Zhang}, J. Comb. Math. Comb. Comput. 61, 169--191 (2007; Zbl 1135.94334)
Stinson, D. R.; Wei, R. Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols. (English) Zbl 1211.94038 J. Math. Cryptol. 1, No. 1, 33-46 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{R. Wei}, J. Math. Cryptol. 1, No. 1, 33--46 (2007; Zbl 1211.94038) Full Text: DOI
Stinson, D. R.; Wu, J. An efficient and secure two-flow zero-knowledge identification protocol. (English) Zbl 1211.94039 J. Math. Cryptol. 1, No. 3, 201-220 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{J. Wu}, J. Math. Cryptol. 1, No. 3, 201--220 (2007; Zbl 1211.94039) Full Text: DOI
Blundo, Carlo; D’Arco, Paolo; De Santis, Alfredo; Stinson, Douglas On unconditionally secure distributed oblivious transfer. (English) Zbl 1129.94041 J. Cryptology 20, No. 3, 323-373 (2007). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A62 PDFBibTeX XMLCite \textit{C. Blundo} et al., J. Cryptology 20, No. 3, 323--373 (2007; Zbl 1129.94041) Full Text: DOI
Stinson, Douglas R. Bent functions. 2nd ed. (English) Zbl 1221.94062 Colbourn, Charles J. (ed.) et al., The CRC handbook of combinatorial designs. Boca Raton, FL: Chapman & Hall/CRC (ISBN 1-58488-506-8/hbk). Discrete Mathematics and its Applications, 337-339 (2007). MSC: 94A60 94A55 11T71 PDFBibTeX XMLCite \textit{D. R. Stinson}, in: The CRC handbook of combinatorial designs. Boca Raton, FL: Chapman \& Hall/CRC. 337--339 (2007; Zbl 1221.94062)
Lee, Jooyoung; Stinson, Douglas R. Tree-based key distribution patterns. (English) Zbl 1151.94534 Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 189-204 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lee} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 3897, 189--204 (2006; Zbl 1151.94534) Full Text: DOI
Muir, J. A.; Stinson, D. R. On the low Hamming weight discrete logarithm problem for nonadjacent representations. (English) Zbl 1099.94020 Appl. Algebra Eng. Commun. Comput. 16, No. 6, 461-472 (2006). MSC: 94A60 14G50 11A63 PDFBibTeX XMLCite \textit{J. A. Muir} and \textit{D. R. Stinson}, Appl. Algebra Eng. Commun. Comput. 16, No. 6, 461--472 (2006; Zbl 1099.94020) Full Text: DOI
Ogata, Wakaha; Kurosawa, Kaoru; Stinson, Douglas R. Optimum secret sharing scheme secure against cheating. (English) Zbl 1119.94011 SIAM J. Discrete Math. 20, No. 1, 79-95 (2006). MSC: 94A62 94A60 05B10 11T71 PDFBibTeX XMLCite \textit{W. Ogata} et al., SIAM J. Discrete Math. 20, No. 1, 79--95 (2006; Zbl 1119.94011) Full Text: DOI
Khoo, Khoongming; Gong, Guang; Stinson, Douglas R. A new characterization of semi-bent and bent functions on finite fields. (English) Zbl 1172.11311 Des. Codes Cryptography 38, No. 2, 279-295 (2006). MSC: 11T71 94A60 PDFBibTeX XMLCite \textit{K. Khoo} et al., Des. Codes Cryptography 38, No. 2, 279--295 (2006; Zbl 1172.11311) Full Text: DOI
Stinson, D. R. Some observations on the theory of cryptographic hash functions. (English) Zbl 1146.94010 Des. Codes Cryptography 38, No. 2, 259-277 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, Des. Codes Cryptography 38, No. 2, 259--277 (2006; Zbl 1146.94010) Full Text: DOI
D’Arco, Paolo; Kishimoto, Wataru; Stinson, Douglas R. Properties and constraints of cheating-immune secret sharing schemes. (English) Zbl 1091.94029 Discrete Appl. Math. 154, No. 2, 219-233 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{P. D'Arco} et al., Discrete Appl. Math. 154, No. 2, 219--233 (2006; Zbl 1091.94029) Full Text: DOI
Muir, James A.; Stinson, Douglas R. Minimality and other properties of the width-\(w\) nonadjacent form. (English) Zbl 1091.94026 Math. Comput. 75, No. 253, 369-384 (2006). Reviewer: Karl-Heinz Zimmermann (Hamburg) MSC: 94A60 11T71 14G50 94B40 PDFBibTeX XMLCite \textit{J. A. Muir} and \textit{D. R. Stinson}, Math. Comput. 75, No. 253, 369--384 (2006; Zbl 1091.94026) Full Text: DOI
Stinson, Douglas R. Cryptography: theory and practice. 3rd ed. (English) Zbl 1085.94001 Discrete Mathematics and its Applications. Boca Raton, FL: Chapman & Hall/CRC Press (ISBN 1-58488-508-4/hbk). xiv, 593 p. (2006). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94-01 94A60 94A62 14G50 PDFBibTeX XMLCite \textit{D. R. Stinson}, Cryptography: theory and practice. 3rd ed. Boca Raton, FL: Chapman \& Hall/CRC Press (2006; Zbl 1085.94001)
Lee, Jooyoung; Stinson, Douglas R. Deterministic key predistribution schemes for distributed sensor networks. (English) Zbl 1117.94343 Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 294-307 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Lee} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 3357, 294--307 (2005; Zbl 1117.94343) Full Text: DOI OA License
Muir, James A.; Stinson, Douglas R. New minimal weight representations for left-to-right window methods. (English) Zbl 1079.94566 Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 366-383 (2005). MSC: 94A60 11A63 14G50 PDFBibTeX XMLCite \textit{J. A. Muir} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 3376, 366--383 (2005; Zbl 1079.94566) Full Text: DOI
Muir, James A.; Stinson, Douglas R. Alternative digit sets for nonadjacent representations. (English) Zbl 1081.94031 Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 306-319 (2004). MSC: 94A60 11A67 PDFBibTeX XMLCite \textit{J. A. Muir} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 3006, 306--319 (2004; Zbl 1081.94031) Full Text: DOI
Ogata, Wakaha; Kurosawa, Kaoru; Stinson, Douglas R.; Saido, Hajime New combinatorial designs and their applications to authentication codes and secret sharing schemes. (English) Zbl 1044.94013 Discrete Math. 279, No. 1-3, 383-405 (2004). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A62 05B10 05B05 PDFBibTeX XMLCite \textit{W. Ogata} et al., Discrete Math. 279, No. 1--3, 383--405 (2004; Zbl 1044.94013) Full Text: DOI
Blundo, C.; D’Arco, P.; De Santis, A.; Stinson, D. R. Contrast optimal threshold visual cryptography schemes. (English) Zbl 1039.94006 SIAM J. Discrete Math. 16, No. 2, 224-261 (2003). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Blundo} et al., SIAM J. Discrete Math. 16, No. 2, 224--261 (2003; Zbl 1039.94006) Full Text: DOI
D’Arco, Paolo; Stinson, Douglas R. Fault tolerant and distributed broadcast encryption. (English) Zbl 1039.94513 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 263-280 (2003). MSC: 94A60 68P25 94A05 PDFBibTeX XMLCite \textit{P. D'Arco} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 2612, 263--280 (2003; Zbl 1039.94513) Full Text: Link
Blundo, Carlo; D’Arco, Paolo; De Santis, Alfredo; Stinson, Douglas R. New results on unconditionally secure distributed oblivious transfer. (English) Zbl 1066.94553 Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00622-2/pbk). Lect. Notes Comput. Sci. 2595, 291-309 (2003). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Blundo} et al., Lect. Notes Comput. Sci. 2595, 291--309 (2003; Zbl 1066.94553) Full Text: Link
D’Arco, Paolo; Stinson, Douglas R. On unconditionally secure robust distributed key distribution centers. (English) Zbl 1065.94544 Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 346-363 (2002). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. D'Arco} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 2501, 346--363 (2002; Zbl 1065.94544) Full Text: DOI
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. (English) Zbl 1020.94010 J. Cryptology 15, No. 4, 285-297 (2002). MSC: 94A60 20E99 PDFBibTeX XMLCite \textit{S. S. Magliveras} et al., J. Cryptology 15, No. 4, 285--297 (2002; Zbl 1020.94010) Full Text: DOI
Stinson, D. R. Universal hash families and the leftover hash lemma, and applications to cryptography and computing. (English) Zbl 1009.68046 J. Comb. Math. Comb. Comput. 42, 3-31 (2002). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, J. Comb. Math. Comb. Comput. 42, 3--31 (2002; Zbl 1009.68046)
Qu, Minghua; Stinson, Doug; Vanstone, Scott Cryptanalysis of the Sakazaki-Okamoto-Mambo ID-based key distribution system over elliptic curves. (English) Zbl 1016.94516 Mullen, Gary L. (ed.) et al., Finite fields with applications to coding theory, cryptography and related areas. Proceedings of the 6th international conference on finite fields and applications, Oaxaca, México, May 21-25, 2001. Berlin: Springer. 263-269 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Qu} et al., in: Finite fields with applications to coding theory, cryptography and related areas. Proceedings of the 6th international conference on finite fields and applications, Oaxaca, México, May 21--25, 2001. Berlin: Springer. 263--269 (2002; Zbl 1016.94516)
Blundo, C.; Masucci, B.; Stinson, D. R.; Wei, R. Constructions and bounds for unconditionally secure non-interactive commitment schemes. (English) Zbl 1004.94016 Des. Codes Cryptography 26, No. 1-3, 97-110 (2002). MSC: 94A60 05B05 PDFBibTeX XMLCite \textit{C. Blundo} et al., Des. Codes Cryptography 26, No. 1--3, 97--110 (2002; Zbl 1004.94016) Full Text: DOI
Eisen, Philip A.; Stinson, Douglas R. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. (English) Zbl 0994.94026 Des. Codes Cryptography 25, No. 1, 15-61 (2002). Reviewer: Ian F.Blake (Toronto) MSC: 94A60 94A62 90C10 PDFBibTeX XMLCite \textit{P. A. Eisen} and \textit{D. R. Stinson}, Des. Codes Cryptography 25, No. 1, 15--61 (2002; Zbl 0994.94026) Full Text: DOI
Stinson, Douglas Cryptography. Theory and practice. 2nd edition. (English) Zbl 0997.94001 CRC Press Series on Discrete Mathematics and its Applications. Boca Raton, FL: Chapman & Hall/CRC (ISBN 1-58488-206-9). 339 p. (2002). MSC: 94-01 94A60 94A62 11T71 14G50 PDFBibTeX XMLCite \textit{D. Stinson}, Cryptography. Theory and practice. 2nd edition. Boca Raton, FL: Chapman \& Hall/CRC (2002; Zbl 0997.94001)
D’Arco, Paolo; Stinson, Douglas Generalized zig-zag functions and oblivious transfer reductions. (English) Zbl 1067.94526 Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 87-102 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{P. D'Arco} and \textit{D. Stinson}, Lect. Notes Comput. Sci. 2259, 87--102 (2001; Zbl 1067.94526) Full Text: Link
Sarkar, Palash; Stinson, Douglas R. Frameproof and IPP codes. (English) Zbl 1011.94547 Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 117-126 (2001). MSC: 94A60 94B60 PDFBibTeX XMLCite \textit{P. Sarkar} and \textit{D. R. Stinson}, Lect. Notes Comput. Sci. 2247, 117--126 (2001; Zbl 1011.94547)
Stinson, Douglas R.; Strobl, Reto Provably secure distributed Schnorr signatures and a \((t,n)\) threshold scheme for implicit certificates. (English) Zbl 1005.94538 Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 417-434 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{R. Strobl}, Lect. Notes Comput. Sci. 2119, 417--434 (2001; Zbl 1005.94538) Full Text: Link
Masucci, Barbara; Stinson, Douglas R. Efficient metering schemes with pricing. (English) Zbl 1031.68530 IEEE Trans. Inf. Theory 47, No. 7, 2835-2844 (2001). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{B. Masucci} and \textit{D. R. Stinson}, IEEE Trans. Inf. Theory 47, No. 7, 2835--2844 (2001; Zbl 1031.68530) Full Text: DOI
Staddon, Jessica N.; Stinson, Douglas R.; Wei, Ruizhong Combinatorial properties of frameproof and traceability codes. (English) Zbl 1001.94032 IEEE Trans. Inf. Theory 47, No. 3, 1042-1049 (2001). MSC: 94A60 68P25 68P30 94B65 94B25 PDFBibTeX XMLCite \textit{J. N. Staddon} et al., IEEE Trans. Inf. Theory 47, No. 3, 1042--1049 (2001; Zbl 1001.94032) Full Text: DOI Link
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R. Almost \(k\)-wise independent sample spaces and their cryptologic applications. (English) Zbl 1008.94017 J. Cryptology 14, No. 4, 231-253 (2001). Reviewer: Jürgen Bierbrauer (Houghton) MSC: 94A60 60A99 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., J. Cryptology 14, No. 4, 231--253 (2001; Zbl 1008.94017) Full Text: DOI
Stinson, D. R. Something about all or nothing (transforms). (English) Zbl 0985.94030 Des. Codes Cryptography 22, No. 2, 133-138 (2001). Reviewer: Bal Kishan Dass (Delhi) MSC: 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, Des. Codes Cryptography 22, No. 2, 133--138 (2001; Zbl 0985.94030) Full Text: DOI
Ateniese, G.; Blundo, C.; De Santis, A.; Stinson, D. R. Extended capabilities for visual cryptography. (English) Zbl 0952.68056 Theor. Comput. Sci. 250, No. 1-2, 143-161 (2001). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{G. Ateniese} et al., Theor. Comput. Sci. 250, No. 1--2, 143--161 (2001; Zbl 0952.68056) Full Text: DOI
Stinson, D. R.; Tran van Trung; Wei, R. Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. (English) Zbl 1054.94013 J. Stat. Plann. Inference 86, No. 2, 595-617 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{D. R. Stinson} et al., J. Stat. Plann. Inference 86, No. 2, 595--617 (2000; Zbl 1054.94013) Full Text: DOI
Stinson, Douglas R.; Wei, Ruizhong Unconditionally secure proactive secret sharing scheme with combinatorial structures. (English) Zbl 0993.94554 Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 200-214 (2000). MSC: 94A62 05B40 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{R. Wei}, Lect. Notes Comput. Sci. 1758, 200--214 (2000; Zbl 0993.94554)
Gong, Guang; Berson, Thomas A.; Stinson, Douglas R. Elliptic curve pseudorandom sequence generators. (English) Zbl 0993.94547 Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 34-48 (2000). MSC: 94A60 94A55 14G50 PDFBibTeX XMLCite \textit{G. Gong} et al., Lect. Notes Comput. Sci. 1758, 34--48 (2000; Zbl 0993.94547)