Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference32 articles.
1. Ballico, E., & Elia, M. (2016). On evaluating multivariate polynomials over finite fields. Quaestiones Mathematicae, 39(1), 1–8.
2. Blakley, G. R. (1979). Safeguarding cryptography keys. In Proceedings of the AFIPS 1979 national computer conference (pp. 313-317).
3. Chan, C.-W., & Chang, C.-C. (2005). A scheme for threshold multi-secret sharing. Applied Mathematics Computation, 166(1), 1–14.
4. Chang, T. Y., Hwang, M. S., & Yang, W. P. (2005). An improvement on the Lin-Wu (t, n)-threshold verifiable multi-secret sharing scheme. Applied Mathematics Computation, 163, 169–178.
5. Das, A., & Adhikari, A. (2010). An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters, 23(9), 993–996.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献