<--- Back to Details
First PageDocument Content
Secret sharing / Scheme theory / Access structure / Scheme / Verifiable secret sharing / Secret sharing using the Chinese remainder theorem / Cryptography / Cryptographic protocols / Key management
Date: 2011-02-28 08:41:34
Secret sharing
Scheme theory
Access structure
Scheme
Verifiable secret sharing
Secret sharing using the Chinese remainder theorem
Cryptography
Cryptographic protocols
Key management

Add to Reading List

Source URL: www.cs.bgu.ac.il

Download Document from Source Website

File Size: 335,16 KB

Share Document on Facebook

Similar Documents