1. Lecture Notes in Computer Science;M Abspoel,2019
2. Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008)
3. Asharov, G., Halevi, S., Lindell, Y., Rabin, T.: Privacy-preserving search of similar patients in genomic data. In: Proceedings on Privacy Enhancing Technologies, vol. 2018, no. 4, pp. 104–124 (2018)
4. Atallah, M.J., Wagstaff Jr, S.S.: Watermarking with quadratic residues. In: Security and Watermarking of Multimedia Contents, vol. 3657, pp. 283–288. International Society for Optics and Photonics (1999)
5. Brauer, A.: Combinatorial methods in the distribution of k-th. power residues. Comb. Math. Appl. 14–37 (1969)