共 19 条
- [1] [Anonymous], 2000, Graduate Texts in Mathematics
- [2] A MODULAR APPROACH TO KEY SAFEGUARDING [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
- [3] General information dispersal algorithms [J]. THEORETICAL COMPUTER SCIENCE, 1998, 209 (1-2) : 87 - 105
- [4] BEGUIN P, 1995, LECT NOTES COMPUTER, V921, P194
- [5] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
- [6] Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
- [7] Cramer R, 1996, LECT NOTES COMPUT SC, V1070, P72
- [8] Desmedt Y, 1998, LECT NOTES COMPUT SC, V1396, P158, DOI 10.1007/BFb0030418
- [9] Ding C., 1996, Chinese remainder theorem: Applications in computing, coding, cryptography
- [10] FRAENKEL AS, 1963, P AM MATH SOC, V14, P790