Reihaneh Safavi-Naini,et al. A Model for Adversarial Wiretap Channels and its Applications , 2015, J. Inf. Process..
 Allison Bishop,et al. Robust Secret Sharing Schemes Against Local Adversaries , 2014, Public Key Cryptography.
 Douglas R. Stinson,et al. Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures , 2010, Cryptography and Communications.
 Yuval Ishai,et al. Scalable Multiparty Computation with Nearly Optimal Work and Resilience , 2008, CRYPTO.
 Keith M. Martin,et al. On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks , 2011, WEWoRC.
 Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1993, EUROCRYPT.
 Anna Gál,et al. Combinatorial methods in boolean function complexity , 1995 .
 Gabriel Bracha,et al. An O(log n) expected rounds randomized byzantine generals protocol , 1987, JACM.
 Ronald Cramer,et al. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups , 2002, CRYPTO.
 Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
 Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
 Kaoru Kurosawa. General Error Decodable Secret Sharing Scheme and Its Application , 2011, IEEE Transactions on Information Theory.
 Richard Taylor. An Integrity Check Value Algorithm for Stream Ciphers , 1993, CRYPTO.
 Ivan Damgård,et al. On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase , 2001, CRYPTO.
 Ivan Damgård,et al. Scalable and Unconditionally Secure Multiparty Computation , 2007, CRYPTO.
 Allison Bishop,et al. Essentially Optimal Robust Secret Sharing with Maximal Corruptions , 2016, EUROCRYPT.
 Matthias Fitzi,et al. Towards Optimal and Efficient Perfectly Secure Message Transmission , 2007, TCC.
 Hao Chen,et al. Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields , 2006, CRYPTO.
 Alfredo De Santis,et al. Size of Shares and Probability of Cheating in Threshold Schemes , 1993, EUROCRYPT.
 Reihaneh Safavi-Naini,et al. Unconditionally-Secure Robust Secret Sharing with Minimum Share Size , 2013, Financial Cryptography.
 Ivan Damgård,et al. Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions , 2015, EUROCRYPT.
 Carles Padró,et al. On Secret Sharing Schemes, Matroids and Polymatroids , 2007, TCC.
 Ingemar Ingemarsson,et al. A Construction of Practical Secret Sharing Schemes using Linear Block Codes , 1992, AUSCRYPT.
 Bert den Boer. A Simple and Key-Economical Unconditional Authentication Scheme , 1993, J. Comput. Secur..
 Kaoru Kurosawa,et al. New combinatorial designs and their applications to authentication codes and secret sharing schemes , 2004, Discret. Math..
 Moti Yung,et al. Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
 Rafail Ostrovsky,et al. Almost-Everywhere Secure Computation with Edge Corruptions , 2013, Journal of Cryptology.
 Rafail Ostrovsky,et al. Unconditionally-Secure Robust Secret Sharing with Compact Shares , 2012, EUROCRYPT.
 Carles Padró,et al. On secret sharing schemes, matroids and polymatroids , 2006, J. Math. Cryptol..
 Kaoru Kurosawa,et al. Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.
 Doron Puder. Expansion of random graphs: new proofs, new results , 2015 .
 Rafail Ostrovsky,et al. Secure Message Transmission with Small Public Discussion , 2010, EUROCRYPT.
 Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
 Carles Padró,et al. Secret Sharing Schemes with Detection of Cheaters for a General Access Structure , 2002, Des. Codes Cryptogr..
 Yuval Ishai,et al. Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography , 2010, IACR Cryptol. ePrint Arch..
 Carles Padró,et al. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors , 2008, EUROCRYPT.
 Kaoru Kurosawa,et al. Almost Secure (1-Round, n-Channel) Message Transmission Scheme , 2007, ICITS.