1. Some recursive constructions for perfect hash families;Atici;J. Combin. Designs,1996
2. Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions;Alon;Algorithmica,1996
3. Key hash functions for message authentication;Bellare,1996
4. Universal hashing and geometric codes;Bierbrauer;Designs, Codes Cryptogr.,1997
5. S.R. Blackburn, Combinatorics and threshold cryptology, in: Combinatorial Designs and their Applications, Research Notes in Mathematics, vol. 403, Chapman and Hall/CRC Press, London/Boca Raton, FL, 1997, pp. 49–70.