@inbook{57175e6c552c457d94eb7fc96c1d0a25,
title = "Crypto topics and applications II",
abstract = "In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials ofeach topic. We have selected in the bibliography a list of representative items, which can be consulted for further details.",
author = "Jennifer Seberry and Chris Charnes and Josef Pieprzyk and Rei Safavi-Naini",
year = "2010",
language = "English",
isbn = "9781584888208",
series = "Chapman & Hall/CRC applied algorithms and data structures series",
publisher = "CRC",
pages = "13--1--13--32",
editor = "Atallah, {Mikhail J.} and Marina Blanton",
booktitle = "Algorithms and theory of computation handbook",
edition = "2nd",
}