
29 Jun
1993
29 Jun
'93
11:20 p.m.
How can a key be split into 20 pieces while only requiring [any ?] 15 to work? Redundancy? There are a fair number of such schemes. The best overview is in Gus Simmons' own chapter in ``Contemporary Cryptology: The Science of Information Integrity'', edited by Simmons and published last year by IEEE Press.
11562
Age (days ago)
11562
Last active (days ago)
0 comments
1 participants
participants (1)
-
smb@research.att.com