12.07.2015 Views

Algorytmy transformacji wielomianowych i ich zastosowania

Algorytmy transformacji wielomianowych i ich zastosowania

Algorytmy transformacji wielomianowych i ich zastosowania

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BibliografiaBostan, A. i Schost, E. (2005). Polynomial evaluation and interpolation on specialsets of points. Journal of Complexity, 21 (4), 420–446.Cantor, D. G. i Kaltofen, E. (1991). On fast multiplication of polynomials overarbitrary algebras. Acta Informatica, 28 (7), 693––701.Chang, C., Lin, C., Lee, W., i Hwang, P. (2004). Secret sharing with access structuresin a hierarchy. Proceedings of the 18th International Conference on AdvancedInformation Networking and Applications, 2 , 31–34.Chang, T., Hwang, M., i Yang, W. (2005). An improvement on the Lin–Wu (t, n)threshold verifiable multi-secret sharing scheme. Applied Mathematics and Computation,163 (1), 169––178.Chaum, D. (1981). Untraceable electronic mail, return addresses and digital pseudonyms.Communications of the ACM , 24 (2), 84 – 88.Cooley, J. W. i Tukey, J. W. (1965). An algorithm for the machine calculationof complex Fourier series. Mathematics of Computation, 19 (90), 297 – 301.Cranor, L. F. i Cytron, R. K. (1997). Sensus: A security-conscious electronic pollingsystem for the internet. Proceedings of the 30th Hawaii International Conferenceon System Sciences: Information System Track-Organizational Systems andTechnology, 3 .Daza, V., Herranz, J., Morillo, P., i Ráfols, C. (2008). Ad-hoc threshold broadcastencryption with shorter ciphertexts. Electronic Notes in Theoretical ComputerScience, 192 (2), 3 – 15.de Boor, C. (2000). Computational aspects of multivariate polynomial interpolation:Indexing the coefficients. Advances in Computational Mathematics, 12 (4), 289 –301.Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing.IEEE Symposium on Foundations of Computer Science, 427 – 437.Feng, J., Wu, H., Tsai, C., i Chu, Y. (2005). A new multi-secret images sharingscheme using Largrange’s interpolation. The Journal of Systems and Software,86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!