Author:
Vaya Dipesh,Khandelwal Sarika
Reference13 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313–7. New York, USA, 4–7 June 1979
2. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
3. Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography-part I: secret sharing. IEEE Trans. Inf. Theory 39(4), 1121–32 (1993)
4. Beimel, A., Chor, B.: Secret sharing with public reconstruction. IEEE Trans. Inf. Theory 44(5), 1887–1896 (1998)
5. Beimel, A., Chor, B.: Universally ideal secret-sharing schemes. IEEE Trans. Inf. Theory 40(3), 786–794 (1994)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Visual Cryptography: An Emerging Technology;Communications in Computer and Information Science;2023