Blundo, Carlo; D’Arco, Paolo; De Santis, Alfredo; Stinson, Douglas On unconditionally secure distributed oblivious transfer. (English) Zbl 1129.94041 J. Cryptology 20, No. 3, 323-373 (2007). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A62 PDFBibTeX XMLCite \textit{C. Blundo} et al., J. Cryptology 20, No. 3, 323--373 (2007; Zbl 1129.94041) Full Text: DOI
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. (English) Zbl 1020.94010 J. Cryptology 15, No. 4, 285-297 (2002). MSC: 94A60 20E99 PDFBibTeX XMLCite \textit{S. S. Magliveras} et al., J. Cryptology 15, No. 4, 285--297 (2002; Zbl 1020.94010) Full Text: DOI
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R. Almost \(k\)-wise independent sample spaces and their cryptologic applications. (English) Zbl 1008.94017 J. Cryptology 14, No. 4, 231-253 (2001). Reviewer: Jürgen Bierbrauer (Houghton) MSC: 94A60 60A99 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., J. Cryptology 14, No. 4, 231--253 (2001; Zbl 1008.94017) Full Text: DOI
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R. On the contrast in visual cryptography schemes. (English) Zbl 0944.94010 J. Cryptology 12, No. 4, 261-289 (1999). Reviewer: Ian F.Blake (Toronto) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Blundo} et al., J. Cryptology 12, No. 4, 261--289 (1999; Zbl 0944.94010) Full Text: DOI
Stinson, D. R.; Massey, J. L. An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions. (English) Zbl 0840.94019 J. Cryptology 8, No. 3, 167-173 (1995). Reviewer: V.V.Gorlov (Minsk) MSC: 94B05 94A60 05E05 PDFBibTeX XMLCite \textit{D. R. Stinson} and \textit{J. L. Massey}, J. Cryptology 8, No. 3, 167--173 (1995; Zbl 0840.94019) Full Text: DOI
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo Graph decompositions and secret sharing schemes. (English) Zbl 0816.94013 J. Cryptology 8, No. 1, 39-64 (1995). MSC: 94A60 68P25 05C90 94A17 PDFBibTeX XMLCite \textit{C. Blundo} et al., J. Cryptology 8, No. 1, 39--64 (1995; Zbl 0816.94013) Full Text: DOI
Brickell, E. F.; Stinson, D. R. Some improved bounds on the information rate of perfect secret sharing schemes. (English) Zbl 0763.94008 J. Cryptology 5, No. 3, 153-166 (1992). MSC: 94A60 PDFBibTeX XMLCite \textit{E. F. Brickell} and \textit{D. R. Stinson}, J. Cryptology 5, No. 3, 153--166 (1992; Zbl 0763.94008) Full Text: DOI
Stinson, D. R. The combinatorics of authentication and secrecy codes. (English) Zbl 0701.94006 J. Cryptology 2, No. 1, 23-49 (1990). MSC: 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, J. Cryptology 2, No. 1, 23--49 (1990; Zbl 0701.94006) Full Text: DOI
Stinson, D. R. A construction for authentication/secrecy codes from certain combinatorial designs. (English) Zbl 0658.94009 J. Cryptology 1, No. 2, 119-127 (1988). MSC: 94A60 94A05 PDFBibTeX XMLCite \textit{D. R. Stinson}, J. Cryptology 1, No. 2, 119--127 (1988; Zbl 0658.94009) Full Text: DOI
Stinson, D. R. Some constructions and bounds for authentication codes. (English) Zbl 0654.94011 J. Cryptology 1, No. 1, 37-51 (1988). MSC: 94A60 94B60 05B05 PDFBibTeX XMLCite \textit{D. R. Stinson}, J. Cryptology 1, No. 1, 37--51 (1988; Zbl 0654.94011) Full Text: DOI