Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference24 articles.
1. Anderson R.J., Ding C., Helleseth T., Kløve T.: How to build robust shared control systems. Des. Codes Cryptogr. 15, 111–124 (1998).
2. Ashikhmin A., Barg A.: Minimal vectors in linear codes. IEEE Trans. Inf. Theory 44, 2010–2017 (1998).
3. Bartoli D., Bonini M.: Minimal linear codes in odd characteristic. IEEE Trans. Inf. Theory 65, 4152–4155 (2019).
4. Carlet C., Ding C., Yuan J.: Linear codes from highly nonlinear functions and their secret sharing schemes. IEEE Trans. Inf. Theory 51, 2089–2102 (2005).
5. Chabanne H., Cohen G., Patey A.: Towards secure two-party computation from the wire-tap channel. In: Information Security and Cryptology-ICISC 2013, Lecture Notes in Comput. Sci., vol. 8565, pp. 34–46. Springer, Cham (2014).
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献