Algorytmy transformacji wielomianowych i ich zastosowania
Algorytmy transformacji wielomianowych i ich zastosowania
Algorytmy transformacji wielomianowych i ich zastosowania
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BibliografiaBostan, A. i Schost, E. (2005). Polynomial evaluation and interpolation on specialsets of points. Journal of Complexity, 21 (4), 420–446.Cantor, D. G. i Kaltofen, E. (1991). On fast multiplication of polynomials overarbitrary algebras. Acta Informatica, 28 (7), 693––701.Chang, C., Lin, C., Lee, W., i Hwang, P. (2004). Secret sharing with access structuresin a hierarchy. Proceedings of the 18th International Conference on AdvancedInformation Networking and Applications, 2 , 31–34.Chang, T., Hwang, M., i Yang, W. (2005). An improvement on the Lin–Wu (t, n)threshold verifiable multi-secret sharing scheme. Applied Mathematics and Computation,163 (1), 169––178.Chaum, D. (1981). Untraceable electronic mail, return addresses and digital pseudonyms.Communications of the ACM , 24 (2), 84 – 88.Cooley, J. W. i Tukey, J. W. (1965). An algorithm for the machine calculationof complex Fourier series. Mathematics of Computation, 19 (90), 297 – 301.Cranor, L. F. i Cytron, R. K. (1997). Sensus: A security-conscious electronic pollingsystem for the internet. Proceedings of the 30th Hawaii International Conferenceon System Sciences: Information System Track-Organizational Systems andTechnology, 3 .Daza, V., Herranz, J., Morillo, P., i Ráfols, C. (2008). Ad-hoc threshold broadcastencryption with shorter ciphertexts. Electronic Notes in Theoretical ComputerScience, 192 (2), 3 – 15.de Boor, C. (2000). Computational aspects of multivariate polynomial interpolation:Indexing the coefficients. Advances in Computational Mathematics, 12 (4), 289 –301.Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing.IEEE Symposium on Foundations of Computer Science, 427 – 437.Feng, J., Wu, H., Tsai, C., i Chu, Y. (2005). A new multi-secret images sharingscheme using Largrange’s interpolation. The Journal of Systems and Software,86