1. A modular approach to key safeguarding;Asmuth;IEEE Trans. Inf. Theory,1983
2. Safeguarding cryptographic keys;Blakley,1979
3. Characterizing ideal weighted threshold secret sharing;Beimel,2005
4. Generalized secret sharing and monotone functions;Benaloh,1989
5. Computational Algebraic Number Theory;Cohen,2000