1. Safeguarding cryptographic keys;Blakley,1979
2. C. Blundo, A. De Santis, K. Kurosawa and W. Ogata, On a fallacious bound for authentication codes, J. Cryptology, to appear.
3. Authentication codes and robust secret sharing schemes;Blundo,1996
4. Schemi robusti per la condivisione di segreti, Tesi di Laurea;Camelia,1996
5. Size of shares and probability of cheating in threshold schemes;Carpentieri,1994