共 29 条
- [1] Ahmad A., Elabdalla A.M., An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences, Computers & Electrical Engineering, 23, 1, pp. 33-39, (1997)
- [2] Ball P., Designing the Molecular World: Chemistry at the Frontier, 19, (1996)
- [3] Blakley G.R., Safeguarding cryptographic keys, International Workshop on Managing Requirements Knowledge (MARK), (1979)
- [4] Catalina C., Grau J.M., Oller-Marcen A.M., Tomicronth L., Counting invertible sums of squares modulo n and a new generalization of Euler’s totient function, Publicationes Mathimaticae, 87, 1–2, pp. 133-145, (2015)
- [5] Deng F.G., Long G.L., Zhou H.Y., An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairs, Physics Letters A, 340, 1–4, pp. 43-50, (2005)
- [6] Hales T.C., A proof of the Kepler conjecture, Annals of Mathematics, 162, 3, pp. 1065-1185, (2005)
- [7] Kaboli R., Khazaei S., Parviz M., On ideal and weakly-ideal access structures, IACR Cryptol, (2020)
- [8] Kim J.L., Nari L., Secret sharing schemes based on additive codes over GF (4), Applicable Algebra in Engineering Communication and Computing, 28, 1, pp. 79-97, (2017)
- [9] Krupic J., Bouza M., Burton S., Barry C., O'Keefe J., Grid cell symmetry is shaped by environmental geometry, Nature, 518, 7538, pp. 232-235, (2015)
- [10] Lein H., Chingfang H., Mingwu Z., Tingting H., Maoyuan Z., Realizing secret sharing with general access structure, Information Sciences, 367, pp. 209-220, (2016)