next up previous
Next: About this document ... Up: Computational experiments on the Previous: Implementación

Bibliography

1
A. Beimel, B. Chor. Universally Ideal Secret Sharing Schemes.Lecture Notes in Computer Science 740: 183-195, 1993.

2
G.R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings, 48: 313-317, 1979.

3
E. F. Brickell, D. M. Davenport. On the classification of Ideal Secret Sharing Schemes. Journal of Cryptology, vol. 4, 123-134, 1991.

4
J.G. Oxley. Matroid Theory. Oxford university Press, 1992.

5
A. Shamir. How to share a secret. Communications of the ACM, 22: 612-613, 1979.



Guillermo Morales-Luna
2000-11-28