暂无分享,去创建一个
[1] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[2] Douglas R. Stinson,et al. Combinatorial designs: constructions and analysis , 2003, SIGA.
[3] Luca Mariot,et al. Sharing Secrets by Computing Preimages of Bipermutive Cellular Automata , 2014, ACRI.
[4] Victor Shoup,et al. Fast construction of irreducible polynomials over finite fields , 1994, SODA '93.
[5] Nobuyasu Osato,et al. Linear Cellular Automata over Z_m , 1983, J. Comput. Syst. Sci..
[6] Harald Niederreiter,et al. Introduction to finite fields and their applications: Structure of Finite Fields , 1994 .
[7] Arthur T. Benjamin,et al. The Probability of Relatively Prime Polynomials , 2007 .
[8] Tamir Tassa,et al. Generalized oblivious transfer by secret sharing , 2011, Des. Codes Cryptogr..
[9] Astrid Reifegerste. On an Involution Concerning Pairs of Polynomials over F2 , 2000, J. Comb. Theory, Ser. A.
[10] Xiang-dong Hou,et al. Number of irreducible polynomials and pairs of relatively prime polynomials in several variables over finite fields , 2008, Finite Fields Their Appl..
[11] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] H. Niederreiter,et al. Introduction to finite fields and their applications: Factorization of Polynomials , 1994 .