|
|
| Property / cites work |
| | |
| Property / cites work: How to share a secret / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q5581642 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Rational secret sharing and multiparty computation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of Ramp Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Share a Secret, Infinitely / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4343446 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3792623 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Evolving ramp secret sharing with a small gap / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security in Locally Repairable Storage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the local leakage resilience of linear secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-malleable secret sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quantum secret sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Verifiable threshold quantum secret sharing with sequential communication / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient quantum secret sharing without a trusted player / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4035739 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to share a function securely / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4249323 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3374918 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Multiparty Computation and Secret Sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Policy Attribute-Based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generalized oblivious transfer by secret sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Alternative Protocols for Generalized Oblivious Transfer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Perfectly secure message transmission / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure message transmission in asynchronous networks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: General Perfectly Secure Message Transmission Using Linear Codes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cutting-edge cryptography through the lens of secret sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941853 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Financial Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Multiparty Computation Goes Live / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Access structure hiding secret sharing from novel set systems and vector families / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An almost-surely terminating polynomial protocol for asynchronous byzantine agreement with optimal resilience / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast asynchronous Byzantine agreement with optimal resilience / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Expected Constant-Round Protocols for Byzantine Agreement / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Asynchronous Byzantine agreement with optimal resilience / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to share a secret with cheaters / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4035712 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constant-Size Commitments to Polynomials and Their Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Asynchronous Computational VSS with Reduced Communication Complexity / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Publicly Verifiable Secret Sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Byzantine Generals Problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Providing anonymity in unconditionally secure secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Strongly ideal secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Anonymous secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the bound for anonymous secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constructions for anonymous secret sharing schemes using combinatorial designs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Steiner Triple Systems without Parallel Classes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Some new 2-resolvable Steiner quadruple systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Transitive Steiner and Kirkman Triple Systems of Order 27 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Almost all Steiner triple systems have perfect matchings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Asymptotic behavior of the chromatic index for hypergraphs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q5661892 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Almost all Steiner triple systems are almost resolvable / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Proper S(t, K,v)'s for t ≥ 3,v ≤ 16, |K| > 1 and Their Extensions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Extending AG(4, 2) to S(4, {5, 6}, 17) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4529517 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: There exists no Steiner system \(S(4,5,17)\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4256358 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4474199 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4343413 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Almost Optimum t-Cheater Identifiable Secret Sharing Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identifying Cheaters without an Honest Majority / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4204100 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Breaking the circuit-size barrier in secret sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards breaking the exponential barrier for general secret sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Better secret sharing via robust conditional disclosure of secrets / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secret-sharing schemes for general and uniform access structures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the size of shares for secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4370857 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The size of a share must be large / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the information rate of perfect secret sharing schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secret-Sharing Schemes: A Survey / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4341739 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secret-Sharing for NP / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Probabilistic encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Pseudorandom Generator from any One-way Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandom bits for constant depth circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hardness vs randomness / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandom generators for space-bounded computation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandomness for network algorithms / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: INTERSECTION THEOREMS FOR SYSTEMS OF FINITE SETS / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Invitation to intersection problems for finite sets / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Extremal problems in hypergraph colourings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Matching Vector Codes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Cryptographic Complexity of the Worst Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: 2-Server PIR with Sub-Polynomial Communication / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: 3-query locally decodable codes of subexponential length / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards 3-query locally decodable codes of subexponential length / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Conditional disclosure of secrets via non-linear reconstruction / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4165427 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4526993 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4228459 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4829810 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Worst-case to average-case reductions for module lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Middle-product Learning with Errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscating Conjunctions under Entropic Ring LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Public Key Encryption Based on Ideal Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: FE for inner products and its application to decentralized ABE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption for Inner Product Predicates from Learning with Errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Reusable garbled circuits and succinct functional encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Round5: compact and fast post-quantum public-key encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Two-message statistically sender-private OT from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: UC-secure OT from LWE, revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice-Based Blind Signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Signatures without Trapdoors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The lattice-based digital signature scheme qTESLA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandom Functions and Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key Homomorphic PRFs and Their Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New and Improved Key-Homomorphic Pseudorandom Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Homomorphic Constrained Pseudorandom Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Private Puncturable PRFs from Standard Lattice Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Private constrained PRFs (and more) from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Watermarking cryptographic functionalities from standard lattice assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Watermarking PRFs from lattices: stronger security via extractable PRFs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Watermarking PRFs under standard assumptions: public marking and security with extraction queries / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Theory of Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A new secure matrix multiplication from ring-LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Noninteractive zero knowledge for NP from (Plain) Learning With Errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identity-Based (Lossy) Trapdoor Functions and Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lossy trapdoor functions and their applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Decade of Lattice Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Classical hardness of learning with errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hardness of SIS and LWE with Small Parameters / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A sieve algorithm for the shortest lattice vector problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Methods for Calculating Vectors of Short Length in a Lattice, Including a Complexity Analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Rankin’s Constant and Blockwise Lattice Reduction / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3549702 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Enumeration Using Extreme Pruning / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Factoring polynomials with rational coefficients / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The LLL algorithm. Survey and applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Sieve algorithms for the shortest vector problem are practical / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q5417723 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the computation of lattice vectors of minimal length, successive minima and reduced bases with applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A hierarchy of polynomial time lattice basis reduction algorithms / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice basis reduction: Improved practical algorithms and solving subset sum problems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2757225 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An LLL Algorithm with Quadratic Complexity / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4938616 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Approximate trapdoors for lattices and smaller hash-and-sign signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: All-but-many lossy trapdoor functions from lattices and applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: All-But-Many Lossy Trapdoor Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simple Lattice Trapdoor Sampling from a Broad Class of Distributions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On secret sharing systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Linear Secret Sharing for Connectivity in Directed Graphs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Reachability is harder for directed than for undirected finite graphs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Representing Boolean functions as polynomials modulo composite numbers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Lambert \(w\) function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3684278 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3231324 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Proofs that ∑1/p Diverges / rank |
| | Normal rank |