30 Jun
1993
30 Jun
'93
3:20 a.m.
How can a key be split into 20 pieces while only requiring [any ?] 15 to work? Redundancy? There are a fair number of such schemes. The best overview is in Gus Simmons' own chapter in ``Contemporary Cryptology: The Science of Information Integrity'', edited by Simmons and published last year by IEEE Press.
11498
Age (days ago)
11498
Last active (days ago)
0 comments
1 participants
participants (1)
-
smb@research.att.com