共 50 条
- [1] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
- [3] Faulty share detection in Shamir's secret sharing [J]. VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA SERIYA 10 PRIKLADNAYA MATEMATIKA INFORMATIKA PROTSESSY UPRAVLENIYA, 2019, 15 (02): : 274 - 282
- [5] Protecting AES with Shamir's Secret Sharing Scheme [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
- [6] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
- [7] Hardware implementation of secure Shamir's secret sharing scheme [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
- [8] Shamir's Secret Sharing for Authentication without Reconstructing Password [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 958 - 963
- [9] Securing graph steganography by using Shamir's secret sharing [J]. INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830