Cryptanalyses of two key assignment schemes based on polynomial interpolations

Shyh-Yih Wang, Chi-Sung Laih. Cryptanalyses of two key assignment schemes based on polynomial interpolations. Computers & Security, 24(2):134-138, 2005. [doi]

@article{WangL05:50,
  title = {Cryptanalyses of two key assignment schemes based on polynomial interpolations},
  author = {Shyh-Yih Wang and Chi-Sung Laih},
  year = {2005},
  doi = {10.1016/j.cose.2004.07.002},
  url = {http://dx.doi.org/10.1016/j.cose.2004.07.002},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/WangL05%3A50},
  cites = {0},
  citedby = {0},
  journal = {Computers & Security},
  volume = {24},
  number = {2},
  pages = {134-138},
}