Conference paper
Modeling polarization for Hyper-NA lithography tools and masks
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
This paper demonstrates that Shamir's scheme [10] is not secure against certain forms of cheating. A small modification to his scheme retains the security and efficiency of the original, is secure against these forms of cheating, and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions. © 1988 International Association for Cryptologic Research.
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Satoshi Hada
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Imran Nasim, Michael E. Henderson
Mathematics
Hannaneh Hajishirzi, Julia Hockenmaier, et al.
UAI 2011