Chin, Francis Y. L.; Ting, Hing-Fung; Tsin, Yung H.; Zhang, Yong A linear-time certifying algorithm for recognizing generalized series-parallel graphs. (English) Zbl 1504.05275 Discrete Appl. Math. 325, 152-171 (2023). MSC: 05C85 68R10 68W10 PDFBibTeX XMLCite \textit{F. Y. L. Chin} et al., Discrete Appl. Math. 325, 152--171 (2023; Zbl 1504.05275) Full Text: DOI
Gyarmati, Máté; Ligeti, Péter On the information ratio of graphs without high-degree neighbors. (English) Zbl 1473.94025 Discrete Appl. Math. 304, 55-62 (2021). MSC: 94A15 94A62 94A60 05C69 05C70 05C75 PDFBibTeX XMLCite \textit{M. Gyarmati} and \textit{P. Ligeti}, Discrete Appl. Math. 304, 55--62 (2021; Zbl 1473.94025) Full Text: DOI
Ersoy, Oğuzhan; Pedersen, Thomas Brochmann; Anarim, Emin Homomorphic extensions of CRT-based secret sharing. (English) Zbl 1452.94102 Discrete Appl. Math. 285, 317-329 (2020). MSC: 94A62 PDFBibTeX XMLCite \textit{O. Ersoy} et al., Discrete Appl. Math. 285, 317--329 (2020; Zbl 1452.94102) Full Text: DOI
Caputo, Stefania; Korchmáros, Gábor; Sonnino, Angelo Multilevel secret sharing schemes arising from the normal rational curve. (English) Zbl 1457.94200 Discrete Appl. Math. 284, 158-165 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Caputo} et al., Discrete Appl. Math. 284, 158--165 (2020; Zbl 1457.94200) Full Text: DOI
Shani, Barak The security of all private-key bits in isogeny-based schemes. (English) Zbl 1457.94220 Discrete Appl. Math. 282, 184-195 (2020). MSC: 94A62 PDFBibTeX XMLCite \textit{B. Shani}, Discrete Appl. Math. 282, 184--195 (2020; Zbl 1457.94220) Full Text: DOI
Dia, Diyé; Kahn, Giacomo; Labernia, Fabien; Loiseau, Yannick; Raynaud, Olivier A closed sets based learning classifier for implicit authentication in web browsing. (English) Zbl 1430.68263 Discrete Appl. Math. 273, 65-80 (2020). MSC: 68T05 68T20 94A62 PDFBibTeX XMLCite \textit{D. Dia} et al., Discrete Appl. Math. 273, 65--80 (2020; Zbl 1430.68263) Full Text: DOI HAL
Gu, Yujie; Miao, Ying Union-intersection-bounded families and their applications. (English) Zbl 1468.05298 Discrete Appl. Math. 266, 346-354 (2019). MSC: 05D05 94A60 94A62 94B35 PDFBibTeX XMLCite \textit{Y. Gu} and \textit{Y. Miao}, Discrete Appl. Math. 266, 346--354 (2019; Zbl 1468.05298) Full Text: DOI
Meng, Keju; Miao, Fuyou; Huang, Wenchao; Xiong, Yan Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem. (English) Zbl 1446.94171 Discrete Appl. Math. 268, 152-163 (2019). MSC: 94A62 11T71 PDFBibTeX XMLCite \textit{K. Meng} et al., Discrete Appl. Math. 268, 152--163 (2019; Zbl 1446.94171) Full Text: DOI
Hyun, Jong Yoon; Kim, Hyun Kwang; Na, Minwon Optimal non-projective linear codes constructed from down-sets. (English) Zbl 1431.94153 Discrete Appl. Math. 254, 135-145 (2019). MSC: 94B05 11T71 94A62 PDFBibTeX XMLCite \textit{J. Y. Hyun} et al., Discrete Appl. Math. 254, 135--145 (2019; Zbl 1431.94153) Full Text: DOI
Wei, Fushan; Kumar, Neeraj; He, Debiao; Yeo, Sang-Soo A general compiler for password-authenticated group key exchange protocol in the standard model. (English) Zbl 1383.68019 Discrete Appl. Math. 241, 78-86 (2018). MSC: 68N20 68P25 94A62 PDFBibTeX XMLCite \textit{F. Wei} et al., Discrete Appl. Math. 241, 78--86 (2018; Zbl 1383.68019) Full Text: DOI
Liu, Zhe; Seo, Hwajeong; Chen, Chien-Ning; Nogami, Yasuyuki; Park, Taehwan; Choi, Jongseok; Kim, Howon Secure GCM implementation on AVR. (English) Zbl 1431.94125 Discrete Appl. Math. 241, 58-66 (2018). MSC: 94A62 PDFBibTeX XMLCite \textit{Z. Liu} et al., Discrete Appl. Math. 241, 58--66 (2018; Zbl 1431.94125) Full Text: DOI
Liu, Shaohui; Rho, Seungmin; Jifara, Worku; Jiang, Feng; Liu, Chun A hybrid framework of data hiding and encryption in H.264/SVC. (English) Zbl 1431.94115 Discrete Appl. Math. 241, 48-57 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Liu} et al., Discrete Appl. Math. 241, 48--57 (2018; Zbl 1431.94115) Full Text: DOI
Li, Fei; Wang, Qiuyan; Lin, Dongdai A class of three-weight and five-weight linear codes. (English) Zbl 1431.94158 Discrete Appl. Math. 241, 25-38 (2018). MSC: 94B05 11T71 94A62 PDFBibTeX XMLCite \textit{F. Li} et al., Discrete Appl. Math. 241, 25--38 (2018; Zbl 1431.94158) Full Text: DOI arXiv
Lu, Hui-Chuan; Fu, Hung-Lin The optimal average information ratio of secret-sharing schemes for the access structures based on unicycle graphs and bipartite graphs. (English) Zbl 1372.05114 Discrete Appl. Math. 233, 131-142 (2017). MSC: 05C38 05C99 94A62 94A15 PDFBibTeX XMLCite \textit{H.-C. Lu} and \textit{H.-L. Fu}, Discrete Appl. Math. 233, 131--142 (2017; Zbl 1372.05114) Full Text: DOI
Shi, Minjia; Liu, Yan; Solé, Patrick Optimal binary codes from trace codes over a non-chain ring. (English) Zbl 1393.94935 Discrete Appl. Math. 219, 176-181 (2017). MSC: 94B05 94A62 PDFBibTeX XMLCite \textit{M. Shi} et al., Discrete Appl. Math. 219, 176--181 (2017; Zbl 1393.94935) Full Text: DOI
Holohan, Naoise; Leith, Douglas J.; Mason, Oliver Differentially private response mechanisms on categorical data. (English) Zbl 1353.68071 Discrete Appl. Math. 211, 86-98 (2016). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{N. Holohan} et al., Discrete Appl. Math. 211, 86--98 (2016; Zbl 1353.68071) Full Text: DOI arXiv Link
Zhou, Yanwei; Yang, Bo; Zhang, Wenzheng Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. (English) Zbl 1338.94097 Discrete Appl. Math. 204, 185-202 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Zhou} et al., Discrete Appl. Math. 204, 185--202 (2016; Zbl 1338.94097) Full Text: DOI
Fernández-Duque, David; Goranko, Valentin Secure aggregation of distributed information: how a team of agents can safely share secrets in front of a spy. (English) Zbl 1356.94090 Discrete Appl. Math. 198, 118-135 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Fernández-Duque} and \textit{V. Goranko}, Discrete Appl. Math. 198, 118--135 (2016; Zbl 1356.94090) Full Text: DOI arXiv
Padró, Carles; Vázquez, Leonor; Yang, An Finding lower bounds on the complexity of secret sharing schemes by linear programming. (English) Zbl 1262.68049 Discrete Appl. Math. 161, No. 7-8, 1072-1084 (2013). MSC: 68Q25 90C05 94A62 PDFBibTeX XMLCite \textit{C. Padró} et al., Discrete Appl. Math. 161, No. 7--8, 1072--1084 (2013; Zbl 1262.68049) Full Text: DOI
Hajiabolhassan, Hossein; Cheraghi, Abbas Bounds for visual cryptography schemes. (English) Zbl 1185.94078 Discrete Appl. Math. 158, No. 6, 659-665 (2010). MSC: 94A62 94A60 94A08 PDFBibTeX XMLCite \textit{H. Hajiabolhassan} and \textit{A. Cheraghi}, Discrete Appl. Math. 158, No. 6, 659--665 (2010; Zbl 1185.94078) Full Text: DOI
Sarkar, Palash Construction of universal one-way hash functions: tree hashing revisited. (English) Zbl 1133.94016 Discrete Appl. Math. 155, No. 16, 2174-2180 (2007). Reviewer: Jörg Desel (Eichstätt) MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{P. Sarkar}, Discrete Appl. Math. 155, No. 16, 2174--2180 (2007; Zbl 1133.94016) Full Text: DOI
Charpin, Pascale (ed.); Kabatianski, Gregory (ed.) Special issue: Coding and cryptography. Selected papers based on the presentations at the international workshop on coding and cryptography (WCC2003), Versailles, France, March 24–28, 2003. (English) Zbl 1094.94500 Discrete Appl. Math. 154, No. 2, 173-436 (2006). MSC: 94-06 00B25 94A60 94A62 94Bxx PDFBibTeX XML
Martí-Farré, Jaume; Padró, Carles Secret sharing schemes on access structures with intersection number equal to one. (English) Zbl 1091.94034 Discrete Appl. Math. 154, No. 3, 552-563 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Martí-Farré} and \textit{C. Padró}, Discrete Appl. Math. 154, No. 3, 552--563 (2006; Zbl 1091.94034) Full Text: DOI
Sibert, Hervé; Dehornoy, Patrick; Girault, Marc Entity authentication schemes using braid word reduction. (English) Zbl 1091.94036 Discrete Appl. Math. 154, No. 2, 420-436 (2006). MSC: 94A62 20F36 PDFBibTeX XMLCite \textit{H. Sibert} et al., Discrete Appl. Math. 154, No. 2, 420--436 (2006; Zbl 1091.94036) Full Text: DOI
Maurer, Ueli Secure multi-party computation made simple. (English) Zbl 1091.94035 Discrete Appl. Math. 154, No. 2, 370-381 (2006). MSC: 94A62 68W15 PDFBibTeX XMLCite \textit{U. Maurer}, Discrete Appl. Math. 154, No. 2, 370--381 (2006; Zbl 1091.94035) Full Text: DOI
Dupont, Régis; Enge, Andreas Provably secure non-interactive key distribution based on pairings. (English) Zbl 1091.94023 Discrete Appl. Math. 154, No. 2, 270-276 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Dupont} and \textit{A. Enge}, Discrete Appl. Math. 154, No. 2, 270--276 (2006; Zbl 1091.94023) Full Text: DOI
De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara Unconditionally secure key assignment schemes. (English) Zbl 1091.94030 Discrete Appl. Math. 154, No. 2, 234-252 (2006). MSC: 94A62 94A17 05C99 PDFBibTeX XMLCite \textit{A. De Santis} et al., Discrete Appl. Math. 154, No. 2, 234--252 (2006; Zbl 1091.94030) Full Text: DOI
D’Arco, Paolo; Kishimoto, Wataru; Stinson, Douglas R. Properties and constraints of cheating-immune secret sharing schemes. (English) Zbl 1091.94029 Discrete Appl. Math. 154, No. 2, 219-233 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{P. D'Arco} et al., Discrete Appl. Math. 154, No. 2, 219--233 (2006; Zbl 1091.94029) Full Text: DOI
Canard, Sébastien; Schoenmakers, Berry; Stam, Martijn; Traoré, Jacques List signature schemes. (English) Zbl 1091.94028 Discrete Appl. Math. 154, No. 2, 189-201 (2006). MSC: 94A62 11A07 PDFBibTeX XMLCite \textit{S. Canard} et al., Discrete Appl. Math. 154, No. 2, 189--201 (2006; Zbl 1091.94028) Full Text: DOI
Camenisch, Jan; Koprowski, Maciej Fine-grained forward-secure signature schemes without random oracles. (English) Zbl 1091.94027 Discrete Appl. Math. 154, No. 2, 175-188 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Koprowski}, Discrete Appl. Math. 154, No. 2, 175--188 (2006; Zbl 1091.94027) Full Text: DOI
Mizuki, Takaaki; Shizuya, Hiroki; Nishizeki, Takao Characterization of optimal key set protocols. (English) Zbl 1028.94024 Discrete Appl. Math. 131, No. 1, 213-236 (2003). MSC: 94A60 94A62 05C05 PDFBibTeX XMLCite \textit{T. Mizuki} et al., Discrete Appl. Math. 131, No. 1, 213--236 (2003; Zbl 1028.94024) Full Text: DOI
Sáez, Germán Generation of key predistribution schemes using secret sharing schemes. (English) Zbl 1023.94008 Discrete Appl. Math. 128, No. 1, 239-249 (2003). MSC: 94A62 94A15 PDFBibTeX XMLCite \textit{G. Sáez}, Discrete Appl. Math. 128, No. 1, 239--249 (2003; Zbl 1023.94008) Full Text: DOI
Kishimoto, Wataru; Okada, Koji; Kurosawa, Kaoru; Ogata, Wakaha On the bound for anonymous secret sharing schemes. (English) Zbl 1020.94018 Discrete Appl. Math. 121, No. 1-3, 193-202 (2002). MSC: 94A62 05B05 PDFBibTeX XMLCite \textit{W. Kishimoto} et al., Discrete Appl. Math. 121, No. 1--3, 193--202 (2002; Zbl 1020.94018) Full Text: DOI
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef Homogeneous bent functions. (English) Zbl 1016.94029 Discrete Appl. Math. 102, No. 1-2, 133-139 (2000). MSC: 94A62 05A05 PDFBibTeX XMLCite \textit{C. Qu} et al., Discrete Appl. Math. 102, No. 1--2, 133--139 (2000; Zbl 1016.94029) Full Text: DOI