Marsh, Duncan Applied geometry for computer graphics and CAD. (English) Zbl 0927.68099 Springer Undergraduate Mathematics Series. London: Springer. xii, 288 p. (1999). Reviewer: J.Vyskoč (Bratislava) MSC: 68U05 68-01 PDFBibTeX XMLCite \textit{D. Marsh}, Applied geometry for computer graphics and CAD. London: Springer (1999; Zbl 0927.68099)
Salomon, David Computer graphics and geometric modeling. (English) Zbl 0927.68098 New York, NY: Springer. xviii, 851 p. (1999). Reviewer: J.Vyskoč (Bratislava) MSC: 68U05 68-01 65D18 PDFBibTeX XMLCite \textit{D. Salomon}, Computer graphics and geometric modeling. New York, NY: Springer (1999; Zbl 0927.68098)
Biham, Eli; Biryukov, Alex; Shamir, Adi Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. (English) Zbl 0927.94013 Stern, Jacques (ed.), Advances in cryptology - EUROCRYPT ’99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2–6, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1592, 12-23 (1999). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{E. Biham} et al., Lect. Notes Comput. Sci. 1592, 12--23 (1999; Zbl 0927.94013) Full Text: DOI
Kurosawa, Kaoru; Ogata, Wakaha Efficient Rabin-type digital signature scheme. (English) Zbl 0922.94006 Des. Codes Cryptography 16, No. 1, 53-64 (1999). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{W. Ogata}, Des. Codes Cryptography 16, No. 1, 53--64 (1999; Zbl 0922.94006) Full Text: DOI
Clark, Andrew; Dawson, Ed Optimisation heuristics for the automated cryptanalysis of classical ciphers. (English) Zbl 0922.94007 J. Comb. Math. Comb. Comput. 28, 63-86 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{A. Clark} and \textit{E. Dawson}, J. Comb. Math. Comb. Comput. 28, 63--86 (1998; Zbl 0922.94007)
Crevato, Cristiano; Sgarro, Andrea General lower bounds for chosen-content attacks against authentication codes. (English) Zbl 0915.94007 J. Discrete Math. Sci. Cryptography 1, No. 1, 63-72 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. Crevato} and \textit{A. Sgarro}, J. Discrete Math. Sci. Cryptography 1, No. 1, 63--72 (1998; Zbl 0915.94007) Full Text: DOI
Damgård, Ivan B.; Knudsen, Lars R. Two-key triple encryption. (English) Zbl 0920.94006 J. Cryptology 11, No. 3, 209-218 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{I. B. Damgård} and \textit{L. R. Knudsen}, J. Cryptology 11, No. 3, 209--218 (1998; Zbl 0920.94006) Full Text: DOI
Anderson, Ross; Ding, Cunsheng; Helleseth, Tor; Kløve, Torleiv How to build robust shared control systems. (English) Zbl 0919.94012 Des. Codes Cryptography 15, No. 2, 111-124 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{R. Anderson} et al., Des. Codes Cryptography 15, No. 2, 111--124 (1998; Zbl 0919.94012) Full Text: DOI
Kurosawa, Kaoru; Okada, Koji; Saido, Hajime New combinatorial bounds for authentication codes and key predistribution schemes. (English) Zbl 0924.94029 Des. Codes Cryptography 15, No. 1, 87-100 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Des. Codes Cryptography 15, No. 1, 87--100 (1998; Zbl 0924.94029) Full Text: DOI
Gehrmann, Christian Multiround unconditionally secure authentication. (English) Zbl 0924.94028 Des. Codes Cryptography 15, No. 1, 67-86 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 94B15 PDFBibTeX XMLCite \textit{C. Gehrmann}, Des. Codes Cryptography 15, No. 1, 67--86 (1998; Zbl 0924.94028) Full Text: DOI
van Dijk, Marten; Gehrmann, Christian; Smeets, Ben Unconditionally secure group authentication. (English) Zbl 0917.94015 Des. Codes Cryptography 14, No. 3, 281-296 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A62 PDFBibTeX XMLCite \textit{M. van Dijk} et al., Des. Codes Cryptography 14, No. 3, 281--296 (1998; Zbl 0917.94015) Full Text: DOI
He, Jingmin; Dawson, Ed Shared secret reconstruction. (English) Zbl 0917.94014 Des. Codes Cryptography 14, No. 3, 221-237 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A62 PDFBibTeX XMLCite \textit{J. He} and \textit{E. Dawson}, Des. Codes Cryptography 14, No. 3, 221--237 (1998; Zbl 0917.94014) Full Text: DOI
Schnorr, Claus Peter; Vaudenay, Serge The black-box model for cryptographic primitives. (English) Zbl 0923.94024 J. Cryptology 11, No. 2, 125-140 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. P. Schnorr} and \textit{S. Vaudenay}, J. Cryptology 11, No. 2, 125--140 (1998; Zbl 0923.94024) Full Text: DOI
Bergin, Joseph Data structure programming. With the standard template library in C++. (English) Zbl 0904.68072 Undergraduate Texts in Computer Science. New York, NY: Springer. xiv, 336 p. (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 68P05 68-02 68N15 PDFBibTeX XMLCite \textit{J. Bergin}, Data structure programming. With the standard template library in C++. New York, NY: Springer (1998; Zbl 0904.68072)
Chambers, John M. Programming with data. A guide to the S language. (English) Zbl 0902.68022 New York, NY: Springer. xv, 469 p. (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 68N15 68-02 PDFBibTeX XMLCite \textit{J. M. Chambers}, Programming with data. A guide to the S language. New York, NY: Springer (1998; Zbl 0902.68022)
Okamoto, Tatsuaki Threshold key-recovery systems for RSA. (English) Zbl 0910.94016 Christianson, Bruce (ed.) et al., Security protocols. 5th international workshop, Paris, France, April 7–9, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1361, 191-200 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{T. Okamoto}, Lect. Notes Comput. Sci. 1361, 191--200 (1998; Zbl 0910.94016)
Sakurai, Kouichi; Shizuya, Hiroki A structural comparison of the computational difficulty of breaking discrete log cryptosystems. (English) Zbl 0903.94043 J. Cryptology 11, No. 1, 29-43 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68Q99 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{H. Shizuya}, J. Cryptology 11, No. 1, 29--43 (1998; Zbl 0903.94043) Full Text: DOI
Joye, Marc; Quisquater, Jean-Jacques Cryptanalysis of RSA-type cryptosystems: a visit. (English) Zbl 0910.94015 Wright, Rebecca N. (ed.) et al., Network threats. DIMACS workshop, New Brunswick, NJ, USA, December 2–4, 1996. Providence, RI: AMS, American Mathematical Society. DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 38, 21-31 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{M. Joye} and \textit{J.-J. Quisquater}, DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 38, 21--31 (1998; Zbl 0910.94015)
Feldman, Michael B. Software construction and data structures with Ada 95. 2nd ed. (English) Zbl 0853.68078 Amsterdam: Addison-Wesley. xiii, 647 p. (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 68N99 68Q65 68P05 68-01 PDFBibTeX XMLCite \textit{M. B. Feldman}, Software construction and data structures with Ada 95. 2nd ed. Amsterdam: Addison-Wesley (1997; Zbl 0853.68078)
Feng, Rongquan; Kwak, Jin Ho A construction of authentication codes with perfect secrecy from geometry of classical groups. (English) Zbl 0918.94015 J. Comb. Inf. Syst. Sci. 22, No. 1, 9-29 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{R. Feng} and \textit{J. H. Kwak}, J. Comb. Inf. Syst. Sci. 22, No. 1, 9--29 (1997; Zbl 0918.94015)
Lin, Bo; Shepherd, Simon LABYRINTH: A new ultra high speed stream cipher. (English) Zbl 0917.94009 Darnell, Michael (ed.), Cryptography and coding. 6th IMA international conference, Cirencester, GB, December 17–19, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1355, 192-198 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{B. Lin} and \textit{S. Shepherd}, Lect. Notes Comput. Sci. 1355, 192--198 (1997; Zbl 0917.94009)
Jackson, Wen-Ai; Martin, Keith M.; O’Keefe, Christine Mutually trusted authority-free secret sharing schemes. (English) Zbl 0899.94015 J. Cryptology 10, No. 4, 261-289 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{W.-A. Jackson} et al., J. Cryptology 10, No. 4, 261--289 (1997; Zbl 0899.94015) Full Text: DOI
Coppersmith, Don Small solutions to polynomial equations, and low exponent RSA vulnerabilities. (English) Zbl 0912.11056 J. Cryptology 10, No. 4, 233-260 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 11Y16 94A60 11Y05 PDFBibTeX XMLCite \textit{D. Coppersmith}, J. Cryptology 10, No. 4, 233--260 (1997; Zbl 0912.11056) Full Text: DOI
Boyd, Colin Enforcing traceability in software. (English) Zbl 0893.94043 Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 398-408 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. Boyd}, Lect. Notes Comput. Sci. 1334, 398--408 (1997; Zbl 0893.94043)
Patarin, Jacques; Goubin, Louis Trapdoor one-way permutations and multivariate polynomials. (English) Zbl 0893.94045 Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 356-368 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{J. Patarin} and \textit{L. Goubin}, Lect. Notes Comput. Sci. 1334, 356--368 (1997; Zbl 0893.94045)
Boyd, Colin Digital signature and public key cryptosystem in a prime order subgroup of \(\mathbb{Z}_ n^*\). (English) Zbl 0890.94023 Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 346-355 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. Boyd}, Lect. Notes Comput. Sci. 1334, 346--355 (1997; Zbl 0890.94023)
Bleichenbacher, Daniel; Joye, Marc; Quisquater, Jean-Jacques A new and optimal chosen-message attack on RSA-type cryptosystems. (English) Zbl 0890.94026 Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 302-313 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{D. Bleichenbacher} et al., Lect. Notes Comput. Sci. 1334, 302--313 (1997; Zbl 0890.94026)
Zhang, Xian-Mo; Zheng, Yuliang Cryptographically resilient functions. (English) Zbl 0890.94029 IEEE Trans. Inf. Theory 43, No. 5, 1740-1747 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{X.-M. Zhang} and \textit{Y. Zheng}, IEEE Trans. Inf. Theory 43, No. 5, 1740--1747 (1997; Zbl 0890.94029) Full Text: DOI
Maurer, Ueli; Wolf, Stefan Privacy amplification secure against active adversaries. (English) Zbl 0898.94007 Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 307-321 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{U. Maurer} and \textit{S. Wolf}, Lect. Notes Comput. Sci. 1294, 307--321 (1997; Zbl 0898.94007)
Bellare, Mihir; Goldwasser, Shafi; Micciancio, Daniele ‘Pseudo-random’ number generation within cryptographic algorithms: The DDS case. (English) Zbl 0893.94044 Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 277-291 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 1294, 277--291 (1997; Zbl 0893.94044)
Adams, Carlisle M. Constructing symmetric ciphers using the CAST design procedure. (English) Zbl 0880.94011 Des. Codes Cryptography 12, No. 3, 283-316 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. M. Adams}, Des. Codes Cryptography 12, No. 3, 283--316 (1997; Zbl 0880.94011) Full Text: DOI
Lee, J.; Heys, H. M.; Tavares, S. E. Resistance of a CAST-like encryption algorithm to linear and differential cryptanalysis. (English) Zbl 0880.94012 Des. Codes Cryptography 12, No. 3, 267-282 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lee} et al., Des. Codes Cryptography 12, No. 3, 267--282 (1997; Zbl 0880.94012) Full Text: DOI
Rijmen, Vincent; Preneel, Bart; de Win, Erik On weaknesses of non-surjective round functions. (English) Zbl 0890.94028 Des. Codes Cryptography 12, No. 3, 253-266 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{V. Rijmen} et al., Des. Codes Cryptography 12, No. 3, 253--266 (1997; Zbl 0890.94028) Full Text: DOI
Rogier, N.; Chauvaud, Pascal MD2 is not secure without the checksum byte. (English) Zbl 0880.94010 Des. Codes Cryptography 12, No. 3, 245-251 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{N. Rogier} and \textit{P. Chauvaud}, Des. Codes Cryptography 12, No. 3, 245--251 (1997; Zbl 0880.94010) Full Text: DOI
Stinson, Doug R. On some methods for unconditionally secure key distribution and broadcast encryption. (English) Zbl 0880.94009 Des. Codes Cryptography 12, No. 3, 215-243 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{D. R. Stinson}, Des. Codes Cryptography 12, No. 3, 215--243 (1997; Zbl 0880.94009) Full Text: DOI
Burmester, Mike; Desmedt, Yvo G.; Piper, Fred; Walker, Michael A general zero-knowledge scheme. (English) Zbl 0906.68088 Des. Codes Cryptography 12, No. 1, 13-37 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 68Q25 68P25 94A60 PDFBibTeX XMLCite \textit{M. Burmester} et al., Des. Codes Cryptography 12, No. 1, 13--37 (1997; Zbl 0906.68088) Full Text: DOI
Blundo, Carlo; De Santis, Alfredo; De Simone, Roberto; Vaccaro, Ugo Tight bounds on the information rate of secret sharing schemes. (English) Zbl 0878.94050 Des. Codes Cryptography 11, No. 2, 107-122 (1997). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. Blundo} et al., Des. Codes Cryptography 11, No. 2, 107--122 (1997; Zbl 0878.94050) Full Text: DOI
Beidler, John Data structures and algorithms. An object-oriented approach using Ada 95. (English) Zbl 0863.68055 Undergraduate Texts in Computer Science. New York, NY: Springer. xvi, 364 p. (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 68P05 68N99 68-01 68N15 68P10 PDFBibTeX XMLCite \textit{J. Beidler}, Data structures and algorithms. An object-oriented approach using Ada 95. New York, NY: Springer (1996; Zbl 0863.68055)
Franklin, Matthew; Haber, Stuart Joint encryption and message-efficient secure computation. (English) Zbl 0864.94017 J. Cryptology 9, No. 4, 217-232 (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Franklin} and \textit{S. Haber}, J. Cryptology 9, No. 4, 217--232 (1996; Zbl 0864.94017)
Fischer, M. J.; Micali, S.; Rackoff, C. A secure protocol for the oblivious transfer. (Extended abstract). (English) Zbl 0861.94015 J. Cryptology 9, No. 3, 191-195 (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. J. Fischer} et al., J. Cryptology 9, No. 3, 191--195 (1996; Zbl 0861.94015)
Bellare, Mihir; Yung, Moti Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation. (English) Zbl 0861.94013 J. Cryptology 9, No. 3, 149-166 (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Bellare} and \textit{M. Yung}, J. Cryptology 9, No. 3, 149--166 (1996; Zbl 0861.94013)
Gollmann, Dieter; Han, Yongfei; Mitchell, Chris J. Redundant integer representations and fast exponentiation. (English) Zbl 0852.94016 Des. Codes Cryptography 7, No. 1-2, 135-151 (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{D. Gollmann} et al., Des. Codes Cryptography 7, No. 1--2, 135--151 (1996; Zbl 0852.94016) Full Text: DOI
Nyberg, Kaisa; Rueppel, Rainer A. Message recovery for signature schemes based on the discrete logarithm problem. (English) Zbl 0852.94017 Des. Codes Cryptography 7, No. 1-2, 61-81 (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Nyberg} and \textit{R. A. Rueppel}, Des. Codes Cryptography 7, No. 1--2, 61--81 (1996; Zbl 0852.94017) Full Text: DOI
Luby, Michael Pseudorandomness and cryptographic applications. (English) Zbl 0849.94017 Princeton, NJ: Princeton Univ. Press. xvi, 234 p. (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 11K45 94-01 68Q15 94A55 PDFBibTeX XMLCite \textit{M. Luby}, Pseudorandomness and cryptographic applications. Princeton, NJ: Princeton Univ. Press (1996; Zbl 0849.94017)
Sedgewick, Robert; Flajolet, Philippe An introduction to the analysis of algorithms. Foreword by D. E. Knuth. (English) Zbl 0841.68059 Amsterdam: Addison-Wesley. xv, 492 p. (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 68Q25 68-01 PDFBibTeX XMLCite \textit{R. Sedgewick} and \textit{P. Flajolet}, An introduction to the analysis of algorithms. Foreword by D. E. Knuth. Amsterdam: Addison-Wesley (1996; Zbl 0841.68059)
Bennett, Charles H.; Brassard, Gilles; Crépeau, Claude; Maurer, Ueli M. Generalized privacy amplification. (English) Zbl 0856.94018 IEEE Trans. Inf. Theory 41, No. 6, Pt. 2, 1915-1923 (1995). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{C. H. Bennett} et al., IEEE Trans. Inf. Theory 41, No. 6, Part 2, 1915--1923 (1995; Zbl 0856.94018) Full Text: DOI Link
Blackburn, Simon; Murphy, Sean; Stern, Jacques The cryptanalysis of a public-key implementation of finite group mappings. (English) Zbl 0833.94010 J. Cryptology 8, No. 3, 157-166 (1995). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 20C99 PDFBibTeX XMLCite \textit{S. Blackburn} et al., J. Cryptology 8, No. 3, 157--166 (1995; Zbl 0833.94010) Full Text: DOI
Martienssen, W.; Hübinger, B.; Doerner, R. Chaotic cryptology. (English) Zbl 0824.94017 Ann. Phys. (8) 4, No. 1, 35-42 (1995). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 37D45 PDFBibTeX XMLCite \textit{W. Martienssen} et al., Ann. Phys. (8) 4, No. 1, 35--42 (1995; Zbl 0824.94017) Full Text: DOI
Simsion, Graeme C. Data modeling essentials. Analysis, design, and innovation. (English) Zbl 0839.68021 London: itp. xx, 310 p. (1994). Reviewer: J.Vyskoč (Bratislava) MSC: 68P05 68-01 PDFBibTeX XMLCite \textit{G. C. Simsion}, Data modeling essentials. Analysis, design, and innovation. London: itp (1994; Zbl 0839.68021)
Glaeser, Georg Fast algorithms for 3D-graphics. Incl. 1 disk. (English) Zbl 0823.68109 Berlin: Springer-Verlag. xi, 354 p. (1994). Reviewer: J.Vyskoč (Bratislava) MSC: 68U05 68W10 68-01 PDFBibTeX XMLCite \textit{G. Glaeser}, Fast algorithms for 3D-graphics. Incl. 1 disk. Berlin: Springer-Verlag (1994; Zbl 0823.68109)
Sharir, Micha; Toledo, Sivan Extremal polygon containment problems. (English) Zbl 0820.68125 Comput. Geom. 4, No. 2, 99-118 (1994). Reviewer: J.Vyskoč (Bratislava) MSC: 68U05 68Q25 52B05 PDFBibTeX XMLCite \textit{M. Sharir} and \textit{S. Toledo}, Comput. Geom. 4, No. 2, 99--118 (1994; Zbl 0820.68125) Full Text: DOI
Hershberger, John; Snoeyink, Jack Computing minimum length paths of a given homotopy class. (English) Zbl 0815.68116 Comput. Geom. 4, No. 2, 63-97 (1994). Reviewer: J.Vyskoč (Bratislava) MSC: 68U05 55P99 68W10 PDFBibTeX XMLCite \textit{J. Hershberger} and \textit{J. Snoeyink}, Comput. Geom. 4, No. 2, 63--97 (1994; Zbl 0815.68116) Full Text: DOI
Chazelle, Bernard; Friedman, Joel Point location among hyperplanes and unidirectional ray-shooting. (English) Zbl 0815.68114 Comput. Geom. 4, No. 2, 53-62 (1994). Reviewer: J.Vyskoč (Bratislava) MSC: 68U05 68Q25 PDFBibTeX XMLCite \textit{B. Chazelle} and \textit{J. Friedman}, Comput. Geom. 4, No. 2, 53--62 (1994; Zbl 0815.68114) Full Text: DOI
Toroslu, I. H.; Qadah, G. Z.; Henschen, L. An efficient database transitive closure algorithm. (English) Zbl 0815.68049 Appl. Intell. 4, No. 2, 205-218 (1994). Reviewer: J.Vyskoč (Bratislava) MSC: 68P15 68W10 68P20 68T35 PDFBibTeX XMLCite \textit{I. H. Toroslu} et al., Appl. Intell. 4, No. 2, 205--218 (1994; Zbl 0815.68049) Full Text: DOI
Sgarro, Andrea An asymptotic coding theorem for authentication and secrecy. (English) Zbl 0844.94012 Capocelli, Renato (ed.) et al., Sequences II. Methods in communication, security and computer science. Papers presented at the workshop, held June 17-21, 1991 in Positano, Italy. New York, NY: Springer-Verlag. 430-436 (1993). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Sgarro}, in: Sequences II. Methods in communication, security and computer science. Papers presented at the workshop, held June 17-21, 1991 in Positano, Italy. New York, NY: Springer-Verlag. 430--436 (1993; Zbl 0844.94012)
Bellare, Mihir; Goldreich, Oded On defining proofs of knowledge. (English) Zbl 0823.94016 Brickell, Ernest F. (ed.), Advances in cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 740, 390-420 (1993). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68T15 PDFBibTeX XMLCite \textit{M. Bellare} and \textit{O. Goldreich}, Lect. Notes Comput. Sci. 740, 390--420 (1993; Zbl 0823.94016)
Ferreira, A. On space-efficient algorithms for certain NP-complete problems. (English) Zbl 0807.68052 Theor. Comput. Sci. 120, No. 2, 311-315 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q25 PDFBibTeX XMLCite \textit{A. Ferreira}, Theor. Comput. Sci. 120, No. 2, 311--315 (1993; Zbl 0807.68052) Full Text: DOI
Atkinson, M. D.; Walker, Louise Enumerating \(k\)-way trees. (English) Zbl 0793.68045 Inf. Process. Lett. 48, No. 2, 73-75 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68P05 68R05 05C05 05A15 PDFBibTeX XMLCite \textit{M. D. Atkinson} and \textit{L. Walker}, Inf. Process. Lett. 48, No. 2, 73--75 (1993; Zbl 0793.68045) Full Text: DOI
Litow, B.; Dumas, Ph. Additive cellular automata and algebraic series. (English) Zbl 0787.68074 Theor. Comput. Sci. 119, No. 2, 345-354 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q80 11B85 PDFBibTeX XMLCite \textit{B. Litow} and \textit{Ph. Dumas}, Theor. Comput. Sci. 119, No. 2, 345--354 (1993; Zbl 0787.68074) Full Text: DOI
Mehlhorn, K.; Sharir, M.; Welzl, E. Tail estimates for the efficiency of randomized incremental algorithms for line segment intersection. (English) Zbl 0781.68120 Comput. Geom. 3, No. 4, 235-246 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68U05 68Q25 PDFBibTeX XMLCite \textit{K. Mehlhorn} et al., Comput. Geom. 3, No. 4, 235--246 (1993; Zbl 0781.68120) Full Text: DOI
Clarkson, Kenneth L.; Mehlhorn, Kurt; Seidel, Raimund Four results on randomized incremental constructions. (English) Zbl 0781.68112 Comput. Geom. 3, No. 4, 185-212 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68U05 68Q25 PDFBibTeX XMLCite \textit{K. L. Clarkson} et al., Comput. Geom. 3, No. 4, 185--212 (1993; Zbl 0781.68112) Full Text: DOI
Mulmuley, Ketan Computational geometry: an introduction through randomized algorithms. (English) Zbl 0806.68109 Englewood Cliffs, NJ: Prentice Hall. XV, 447 p. $ 32.25 /hc (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68U05 68P10 68W10 68-01 52C35 52B55 PDFBibTeX XMLCite \textit{K. Mulmuley}, Computational geometry: an introduction through randomized algorithms. Englewood Cliffs, NJ: Prentice Hall (1993; Zbl 0806.68109)
Allender, Eric; Beigel, Richard; Hertrampf, Ulrich; Homer, Steven Almost-everywhere complexity hierarchies for nondeterministic time. (English) Zbl 0779.68032 Theor. Comput. Sci. 115, No. 2, 225-241 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q15 PDFBibTeX XMLCite \textit{E. Allender} et al., Theor. Comput. Sci. 115, No. 2, 225--241 (1993; Zbl 0779.68032) Full Text: DOI
Chor, Benny; Kushilevitz, Eyal Secret sharing over infinite domains. (English) Zbl 0774.94003 J. Cryptology 6, No. 2, 87-95 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{B. Chor} and \textit{E. Kushilevitz}, J. Cryptology 6, No. 2, 87--95 (1993; Zbl 0774.94003) Full Text: DOI
Rifà-Coma, Josep How to avoid the cheaters succeeding in the key sharing scheme. (English) Zbl 0774.94004 Des. Codes Cryptography 3, No. 3, 221-228 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{J. Rifà-Coma}, Des. Codes Cryptography 3, No. 3, 221--228 (1993; Zbl 0774.94004) Full Text: DOI
Golin, Mordecai J. How many maxima can there be? (English) Zbl 0774.68059 Comput. Geom. 2, No. 6, 335-353 (1993). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q25 68U05 PDFBibTeX XMLCite \textit{M. J. Golin}, Comput. Geom. 2, No. 6, 335--353 (1993; Zbl 0774.68059) Full Text: DOI
Lloyd, S. Characterising and counting functions satisfying the strict avalanche criterion of order \((n-3)\). (English) Zbl 0763.94012 Cryptography and coding, Proc. 2nd Conf., Cirencester/UK 1989, Inst. Math. Appl. Conf. Ser., New Ser. 33, 165-172 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{S. Lloyd}, Inst. Math. Appl. Conf. Ser., New Ser. 33, 165--172 (1992; Zbl 0763.94012)
Mix Barrington, David A.; Compton, Kevin; Straubing, Howard; Thérien, Denis Regular languages in \(NC\). (English) Zbl 0757.68057 J. Comput. Syst. Sci. 44, No. 3, 478-499 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q15 20M35 68Q45 PDFBibTeX XMLCite \textit{D. A. Mix Barrington} et al., J. Comput. Syst. Sci. 44, No. 3, 478--499 (1992; Zbl 0757.68057) Full Text: DOI
Homer, Steven; Selman, Alan L. Oracles for structural properties: The isomorphism problem and public-key cryptography. (English) Zbl 0757.68055 J. Comput. Syst. Sci. 44, No. 2, 287-301 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q15 68P25 94A60 68Q05 03D15 PDFBibTeX XMLCite \textit{S. Homer} and \textit{A. L. Selman}, J. Comput. Syst. Sci. 44, No. 2, 287--301 (1992; Zbl 0757.68055) Full Text: DOI
Köbler, Johannes; Schöning, Uwe; Toda, Seinosuke; Torán, Jacobo Turing machines with few accepting computations and low sets for PP. (English) Zbl 0757.68056 J. Comput. Syst. Sci. 44, No. 2, 272-286 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q15 03D15 PDFBibTeX XMLCite \textit{J. Köbler} et al., J. Comput. Syst. Sci. 44, No. 2, 272--286 (1992; Zbl 0757.68056) Full Text: DOI
Feige, Uriel; Shamir, Adi Multi-oracle interactive protocols with constant space verifiers. (English) Zbl 0757.68050 J. Comput. Syst. Sci. 44, No. 2, 259-271 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q05 68M10 68P25 PDFBibTeX XMLCite \textit{U. Feige} and \textit{A. Shamir}, J. Comput. Syst. Sci. 44, No. 2, 259--271 (1992; Zbl 0757.68050) Full Text: DOI
Mahmoud, Hosam M. Evolution of random search trees. (English) Zbl 0762.68033 Pure and Applied Mathematics. A Wiley-Interscience Series of Texts, Monographs and Tracts. Chichester etc.: John Wiley & Sons Ltd. (ISBN 0-471-53228-2). X, 324 p. (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68Q25 68P05 68-02 PDFBibTeX XMLCite \textit{H. M. Mahmoud}, Evolution of random search trees. Chichester etc.: John Wiley \&| Sons Ltd. (1992; Zbl 0762.68033)
Maurer, Ueli M. Conditionally-perfect secrecy and a provably-secure randomized cipher. (English) Zbl 0746.94013 J. Cryptology 5, No. 1, 53-66 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{U. M. Maurer}, J. Cryptology 5, No. 1, 53--66 (1992; Zbl 0746.94013) Full Text: DOI
Carroll, John M.; Verhagen, Jeff; Wong, Perry T. Chaos in cryptography: The escape from the strange attractor. (English) Zbl 0746.94012 Cryptologia 16, No. 1, 52-72 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 65C10 37D45 PDFBibTeX XMLCite \textit{J. M. Carroll} et al., Cryptologia 16, No. 1, 52--72 (1992; Zbl 0746.94012) Full Text: DOI
Ottmann, Thomas; Wood, Derick Updating binary trees with constant linkage cost. (English) Zbl 0774.68033 Int. J. Found. Comput. Sci. 3, No. 4, 479-501 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68P05 68P20 68W10 PDFBibTeX XMLCite \textit{T. Ottmann} and \textit{D. Wood}, Int. J. Found. Comput. Sci. 3, No. 4, 479--501 (1992; Zbl 0774.68033) Full Text: DOI
Eugeni, Franco Combinatorics and cryptography. (English) Zbl 0768.94009 Combinatorics ’90, Proc. Conf., Gaeta/Italy 1990, Ann. Discrete Math. 52, 159-174 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{F. Eugeni}, Ann. Discrete Math. 52, 159--174 (1992; Zbl 0768.94009)
Wan, Zhexian Construction of Cartesian authentication codes from unitary geometry. (English) Zbl 0764.94022 Des. Codes Cryptography 2, No. 4, 333-356 (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 94B60 94A60 11T71 PDFBibTeX XMLCite \textit{Z. Wan}, Des. Codes Cryptography 2, No. 4, 333--356 (1992; Zbl 0764.94022) Full Text: DOI
Schwarzkopf, Otfried Dynamic maintenance of convex polytopes and related structures. (English) Zbl 0781.68124 Berlin: FU Berlin, FB Mathematik, 84 p. (1992). Reviewer: J.Vyskoc (Bratislava) MSC: 68U05 52B55 68P05 68W10 PDFBibTeX XMLCite \textit{O. Schwarzkopf}, Dynamic maintenance of convex polytopes and related structures. Berlin: FU Berlin, FB Mathematik (1992; Zbl 0781.68124)
Salomaa, Arto A deterministic algorithm for modular knapsack problems. (English) Zbl 0733.68043 Theor. Comput. Sci. 88, No. 1, 127-138 (1991). Reviewer: J.Vyskoc (Rochester) MSC: 68Q25 PDFBibTeX XMLCite \textit{A. Salomaa}, Theor. Comput. Sci. 88, No. 1, 127--138 (1991; Zbl 0733.68043) Full Text: DOI
Beaver, Donald Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. (English) Zbl 0733.68006 J. Cryptology 4, No. 2, 75-122 (1991). Reviewer: J.Vyskoc (Rochester) MSC: 68M10 68M99 68Q99 PDFBibTeX XMLCite \textit{D. Beaver}, J. Cryptology 4, No. 2, 75--122 (1991; Zbl 0733.68006) Full Text: DOI
Karp, Richard M. An introduction to randomized algorithms. (English) Zbl 0757.68085 Discrete Appl. Math. 34, No. 1-3, 165-201 (1991). Reviewer: J.Vyskoc (Bratislava) MSC: 68R05 05A15 65Y05 05C70 68U05 60G50 11Y16 PDFBibTeX XMLCite \textit{R. M. Karp}, Discrete Appl. Math. 34, No. 1--3, 165--201 (1991; Zbl 0757.68085) Full Text: DOI
Li, Daxing; Zhang, Zezeng Breaking a class of public-key cryptosystems with Euclid’s algorithm. (English) Zbl 0737.94008 Chin. Sci. Bull. 36, No. 10, 873-876 (1991). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{D. Li} and \textit{Z. Zhang}, Chin. Sci. Bull. 36, No. 10, 873--876 (1991; Zbl 0737.94008)
De Soete, Marijke New bounds and constructions for authentication/secrecy codes with splitting. (English) Zbl 0739.94010 J. Cryptology 3, No. 3, 173-186 (1991). Reviewer: J.Vyskoc (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. De Soete}, J. Cryptology 3, No. 3, 173--186 (1991; Zbl 0739.94010) Full Text: DOI
Alad’ev, V. Z. Homogeneous structures. Theoretical and applied aspects. (Odnorodnye struktury. Teoreticheskie i prikladnye aspekty.) (Russian. English summary) Zbl 0722.68082 Kiev: Tehkhnika. 272 p. R. 3.00 (1990). Reviewer: J.Vyskoc (Rochester) MSC: 68Q80 68-02 PDFBibTeX XMLCite \textit{V. Z. Alad'ev}, Odnorodnye struktury. Teoreticheskie i prikladnye aspekty (Russian). Kiev: Tehkhnika (1990; Zbl 0722.68082)
Salomaa, Arto Decision problems arising from knapsack transformations. (English) Zbl 0726.68048 Acta Cybern. 9, No. 4, 419-440 (1990). Reviewer: J.Vyskoc (Rochester) MSC: 68Q25 68P25 94A60 PDFBibTeX XMLCite \textit{A. Salomaa}, Acta Cybern. 9, No. 4, 419--440 (1990; Zbl 0726.68048)
Bodlaender, Hans L. Polynomial algorithms for graph isomorphism and chromatic index on partial k-trees. (English) Zbl 0716.68042 J. Algorithms 11, No. 4, 631-643 (1990). Reviewer: J.Vyskoc MSC: 68Q25 68R10 90C39 PDFBibTeX XMLCite \textit{H. L. Bodlaender}, J. Algorithms 11, No. 4, 631--643 (1990; Zbl 0716.68042) Full Text: DOI
Dwork, Cynthia; Stockmeyer, Larry Zero-knowledge with finite state verifiers. (English) Zbl 0716.68033 Advances in cryptology - Crypto ’88, Proc. Conf., Santa Barbara, CA/USA 1988, Lect. Not. Comput. Sci. 403, 71-75 (1990). Reviewer: J.Vyskoc MSC: 68Q05 68Q25 68Q15 PDFBibTeX XML
Lin, Xuduan; Cai, Changnian Sequences with controllable linear complexity profile. (English) Zbl 0714.94008 Chin. Sci. Bull. 35, No. 10, 867-869 (1990). Reviewer: J.Vyskoc MSC: 94A60 PDFBibTeX XMLCite \textit{X. Lin} and \textit{C. Cai}, Chin. Sci. Bull. 35, No. 10, 867--869 (1990; Zbl 0714.94008)
Gibbons, Phillip B.; Karp, Richard M.; Miller, Gary L.; Soroker, Danny Subtree isomorphism is in random NC. (English) Zbl 0711.68052 Discrete Appl. Math. 29, No. 1, 35-62 (1990). Reviewer: J.Vyskoc MSC: 68W15 68R10 68Q25 PDFBibTeX XMLCite \textit{P. B. Gibbons} et al., Discrete Appl. Math. 29, No. 1, 35--62 (1990; Zbl 0711.68052) Full Text: DOI
Kaldewaij, Anne; Rem, Martin The derivation of systolic computations. (English) Zbl 0709.68020 Sci. Comput. Program. 14, No. 2-3, 229-242 (1990). Reviewer: J.Vyskoc MSC: 68W15 68Q60 PDFBibTeX XMLCite \textit{A. Kaldewaij} and \textit{M. Rem}, Sci. Comput. Program. 14, No. 2--3, 229--242 (1990; Zbl 0709.68020) Full Text: DOI
Weiss, Mark Allen; Sedgewick, Robert Tight lower bounds for Shellsort. (English) Zbl 0709.68016 J. Algorithms 11, No. 2, 242-251 (1990). Reviewer: J.Vyskoc MSC: 68P10 68Q25 PDFBibTeX XMLCite \textit{M. A. Weiss} and \textit{R. Sedgewick}, J. Algorithms 11, No. 2, 242--251 (1990; Zbl 0709.68016) Full Text: DOI
Ruskey, Frank; Proskurowski, Andrzej Generating binary trees by transpositions. (English) Zbl 0709.05016 J. Algorithms 11, No. 1, 68-84 (1990). Reviewer: J.Vyskoc MSC: 05C05 68Q25 PDFBibTeX XMLCite \textit{F. Ruskey} and \textit{A. Proskurowski}, J. Algorithms 11, No. 1, 68--84 (1990; Zbl 0709.05016) Full Text: DOI
Gonzalez, Teofilo; Zheng, Si-Qing Approximation algorithms for partitioning a rectangle with interior points. (English) Zbl 0688.68035 Algorithmica 5, No. 1, 11-42 (1990). Reviewer: J.Vyskoc MSC: 68Q25 52Bxx PDFBibTeX XMLCite \textit{T. Gonzalez} and \textit{S.-Q. Zheng}, Algorithmica 5, No. 1, 11--42 (1990; Zbl 0688.68035) Full Text: DOI
Savage, Carla D.; Stallmann, Matthias; Perry, Jo Ellen Solving some combinatorial problems on arrays with one-way dataflow. (English) Zbl 0683.68058 Algorithmica 5, No. 2, 179-199 (1990). Reviewer: J.Vyskoč MSC: 68R10 68Q80 05A99 PDFBibTeX XMLCite \textit{C. D. Savage} et al., Algorithmica 5, No. 2, 179--199 (1990; Zbl 0683.68058) Full Text: DOI
Klein, Rolf Concrete and abstract Voronoi diagrams. (English) Zbl 0699.68005 Lecture Notes in Computer Science, 400. Berlin etc.: Springer-Verlag. IV, 167 p. DM 33.00 (1989). Reviewer: J.Vyskoc MSC: 68-02 68U99 68Q25 PDFBibTeX XMLCite \textit{R. Klein}, Concrete and abstract Voronoi diagrams. Berlin etc.: Springer-Verlag (1989; Zbl 0699.68005) Full Text: DOI
Litwin, Witold (ed.); Schek, Hans-Jörg (ed.) Foundations of data organization and algorithms. 3rd international conference, FODO 1989, Paris, France, June 21-23, 1989. Proceedings. (English) Zbl 0744.68024 Lecture Notes in Computer Science. 367. Berlin etc.: Springer-Verlag. VIII, 531 p. (1989). Reviewer: J.Vyskoc (Bratislava) MSC: 68-06 68P05 68P15 68P10 68P20 PDFBibTeX XMLCite \textit{W. Litwin} (ed.) and \textit{H.-J. Schek} (ed.), Foundations of data organization and algorithms. 3rd international conference, FODO 1989, Paris, France, June 21-23, 1989. Proceedings. Berlin etc.: Springer-Verlag (1989; Zbl 0744.68024)
Levcopoulos, Christos; Lingas, Andrzej; Sack, Jörg R. Heuristics for optimum binary search trees and minimum weight triangulation problems. (English) Zbl 0688.68063 Theor. Comput. Sci. 66, No. 2, 181-203 (1989). Reviewer: J.Vyskoc MSC: 68P10 68W99 52Bxx PDFBibTeX XMLCite \textit{C. Levcopoulos} et al., Theor. Comput. Sci. 66, No. 2, 181--203 (1989; Zbl 0688.68063) Full Text: DOI
Book, Ronald V.; Tang, Shouwen A note on sparse sets and the polynomial-time hierarchy. (English) Zbl 0688.68029 Inf. Process. Lett. 33, No. 3, 141-143 (1989). Reviewer: J.Vyskoc MSC: 68Q25 PDFBibTeX XMLCite \textit{R. V. Book} and \textit{S. Tang}, Inf. Process. Lett. 33, No. 3, 141--143 (1989; Zbl 0688.68029) Full Text: DOI
Falkenhainer, Brian; Forbus, Kenneth D.; Gentner, Dedre The structure-mapping engine: Algorithm and examples. (English) Zbl 0681.68103 Artif. Intell. 41, No. 1, 1-63 (1989). Reviewer: J.Vyskoc MSC: 68T05 68Q25 PDFBibTeX XMLCite \textit{B. Falkenhainer} et al., Artif. Intell. 41, No. 1, 1--63 (1989; Zbl 0681.68103) Full Text: DOI
Chazelle, Bernard; Welzl, Emo Quasi-optimal range searching in spaces of finite VC-dimension. (English) Zbl 0681.68081 Discrete Comput. Geom. 4, No. 5, 467-489 (1989). Reviewer: J.Vyskoc MSC: 68P10 68Q25 PDFBibTeX XMLCite \textit{B. Chazelle} and \textit{E. Welzl}, Discrete Comput. Geom. 4, No. 5, 467--489 (1989; Zbl 0681.68081) Full Text: DOI EuDML