References
- Blakley , G. R. Safeguarding cryptographic keys . Proceedings of AFIPS 1979 National Computer Conference Vol. 48 . June . pp. 313 – 317 . New York
- Shamir , A. 1979 . How to share a secret . Commun. ACM , 22 : 612 – 613 .
- Tompa , M. and Woll , H. 1988 . How to share a secret with cheaters . J. Cryptol , 1 ( 2 ) : 133 – 138 .
- Webster , A. F. and Tavares , S. E. On the designs of S-boxes . Advances in Cryptology – CRYPTO’85 . pp. 523 – 534 . Berlin : Springer . Lecture Notes in Computer Science Vol. 219
- Xiao , G. and Massey , J. L. 1988 . A spectral characterization of correlation immune combining function . IEEE Trans. Inform. Theory , 34 ( 5 ) : 569 – 571 .
- Zhang , X. M. and Pieprzyk , J. Cheating immune secret sharing . ICICS’2001 . pp. 144 – 149 . Lecture Notes in Computer Science Vol. 2229