Exposure-resilient functions and all-or-nothing transforms
From MaRDI portal
Publication:3374929
Recommendations
Cited in
(23)- Short leakage resilient and non-malleable secret sharing schemes
- Leakage-resilient coin tossing
- scientific article; zbMATH DE number 1722684 (Why is no real title available?)
- \(t\)-resilient functions and the partial exposure problem
- An Application of Quasigroups in All-Or-Nothing Transform
- Deniable cryptosystems: simpler constructions and achieving leakage resilience
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Randomness leakage in the KEM/DEM framework
- On the local leakage resilience of linear secret sharing schemes
- Deterministic extractors for small-space sources
- On differential privacy and adaptive data analysis with bounded space
- Invertible binary matrices with maximum number of \(2\)-by-\(2\) invertible submatrices
- All-or-nothing encryption and the package transform
- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
- All or nothing at all
- Public-key encryption schemes with auxiliary inputs
- Applied Cryptography and Network Security
- On security properties of all-or-nothing transforms
- Leakage resilient one-way functions: the auxiliary-input setting
- Randomness extraction in \(\mathsf{AC}^0\) and with small locality
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Memory erasability amplification
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
This page was built for publication: Exposure-resilient functions and all-or-nothing transforms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374929)