Voir la notice de l'article provenant de la source Math-Net.Ru
@article{ISU_2018_18_2_a8, author = {Yu. V. Kosolapov}, title = {On the construction of $(n,k)$-schemes of visual cryptography using a class of linear hash functions over a binary field}, journal = {Izvestiya of Saratov University. Mathematics. Mechanics. Informatics}, pages = {227--239}, publisher = {mathdoc}, volume = {18}, number = {2}, year = {2018}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/ISU_2018_18_2_a8/} }
TY - JOUR AU - Yu. V. Kosolapov TI - On the construction of $(n,k)$-schemes of visual cryptography using a class of linear hash functions over a binary field JO - Izvestiya of Saratov University. Mathematics. Mechanics. Informatics PY - 2018 SP - 227 EP - 239 VL - 18 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/ISU_2018_18_2_a8/ LA - ru ID - ISU_2018_18_2_a8 ER -
%0 Journal Article %A Yu. V. Kosolapov %T On the construction of $(n,k)$-schemes of visual cryptography using a class of linear hash functions over a binary field %J Izvestiya of Saratov University. Mathematics. Mechanics. Informatics %D 2018 %P 227-239 %V 18 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/ISU_2018_18_2_a8/ %G ru %F ISU_2018_18_2_a8
Yu. V. Kosolapov. On the construction of $(n,k)$-schemes of visual cryptography using a class of linear hash functions over a binary field. Izvestiya of Saratov University. Mathematics. Mechanics. Informatics, Tome 18 (2018) no. 2, pp. 227-239. http://geodesic.mathdoc.fr/item/ISU_2018_18_2_a8/
[1] Shamir A., “How to share a secret”, Communications of the ACM, 22:11 (1979), 612–613 | DOI | MR
[2] Blakley G. R., “Safeguarding cryptographic keys”, Proc. of the National Computer Conference, 48 (1979), 313–317
[3] Pogorelov B. A., Sachkov V. N, Dictionary of cryptographic terms, MTsNMO, M., 2006, 91 pp.
[4] Chen H., Cramer R., Goldwasser S., Haan R., Vaikuntanathan V., “Secure Computation from Random Error Correcting Codes”, Advances in Cryptology – EUROCRYPT 2007, EUROCRYPT 2007, Lecture Notes in Computer Science, 4515, Springer, Berlin–Heidelberg, 2007, 291–310 | DOI | MR
[5] Naor M., Shamir A., “Visual cryptography”, Advances in Cryptology – EUROCRYPT'94, EUROCRYPT 1994, Lecture Notes in Computer Science, 950, Springer, Berlin–Heidelberg, 1994, 1–12 | DOI | MR
[6] Pelli D. G., Bex P., “Measuring contrast sensitivity”, Vision Res., 90 (2013), 10–14 | DOI
[7] Carter J. L., Wegman M. N., “Universal classes of hash functions”, Journal of Computer and System Sciences, 18:2 (1979), 143–154 | DOI | MR
[8] Bose M., Mukerjee R., “Optimal $(k, n)$ visual cryptographic schemes for general $k$”, Des. Codes Cryptogr., 55:1 (2010), 19–35 | DOI | MR
[9] Cormen T. H., Leiserson C. E., Rivest R. L., Stein C., Introduction to Algorithms, MIT Press, Cambridge, Massachusetts–London, England, 2009, 1312 pp. | MR
[10] Lakshmanan R., Arumugam S., “Construction of a $(k, n)$-visual cryptography scheme”, Des. Codes Cryptogr., 82:3 (2017), 629–645 | DOI | MR