1. A2-codes from universal hash classes;Bierbrauer,1995
2. Authentication codes with multiple arbiters;Brickell,1988
3. The detection of cheaters in threshold schemes;Brickell,1988
4. Unconditionally-secure digital signatures;Chaum,1990
5. Elements of Information Theory;Cover,1991