Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference22 articles.
1. Ahmadi H., Safavi-Naini R.: Detection of algebraic manipulation in the presence of leakage, ICITS 2013. Lect. Notes Comput. Sci. 8317, 238–258 (2013).
2. Bao J., Ji L., Wei R., Zhang Y.: New existence and nonexistence results for strong external difference families. Discret. Math. 341(6), 1798–1805 (2018).
3. Buratti M., Yan J., Wang C.: From a $$1$$-rotational RBIBD to a partitioned difference family. Electron. J. Comb. 17, R139 (2010).
4. Colbourn C.J., Dinitz J.H.: Handbook of Combinatorial Designs, vol. 42. Chapman & Hall/CRC, London (2006).
5. Cramer R., Dodis Y., Fehr S., Padró C., Wichs D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. EUROCRYPT 4965, 471–488 (2008).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献