1. How to share a secret;Shamir;Commun. ACM,1979
2. A perfect threshold secret sharing scheme to identify cheaters;Carpentieri;Designs Codes Crypt.,1995
3. D.J. Lu, B.R. Zhang, A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems. in: 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008.
4. Block LU factors of generalized companion matrix pencils;Amiraslani;Theor. Comput. Sci.,2007
5. Lagrange and the solution of numerical equations;McGrath;Historia Mathematica,2001