Author:
Candel Gaëlle,Géraud-Stewart Rémi,Naccache David
Publisher
Springer International Publishing
Reference9 articles.
1. Lecture Notes in Computer Science;F Benhamouda,2018
2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, (1979)
3. Dawson, Ed., Donovan, D.M.: The breadth of Shamir’s secret-sharing scheme. Comput. Secur. 13(1), 69–78 (1994)
4. Guruswami, V., Wootters, M.: Repairing Reed-Solomon codes. IEEE Trans. Inf. Theory 63(9), 5684–5698 (2017)
5. Lecture Notes in Computer Science;J Liu,2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献