1. (1) T.M. Cover and J.A. Thomas, Elements of Information Theory, 2nd ed., Wiley, 2006.(山本,古賀,有村,岩本 (訳),情報理論 基礎と広がり,共立出版,2012.)
2. (2) C.E. Shannon, “A mathematical theory of cryptography,” Confidential Report, https://www.iacr.org/museum/shannon/shannon45.pdf, Sept. 1945.
3. (3) C.E. Shannon, “Communication theory of secrecy systems,” Bell Sys. Tech. J., vol.28, pp.656-715, Oct. 1949. DOI: 10.1002/j.1538-7305.1949.tb00928.x
4. (4) H. Yamamoto, “Information theory in cryptology,” IEICE Trans. Fundamentals, vol.E74-A, no.9, pp.2456-2464, Sept. 1991.
5. (5) H. Yamamoto, “On secret sharing communication systems with two or three channels,” IEEE Trans. Inf. Theory, vol.32, no.3, pp.387-393, May 1986. DOI: 10.1109/TIT.1986.1057177