All-or-nothing encryption and the package transform
From MaRDI portal
Publication:4639342
Recommendations
Cites work
- scientific article; zbMATH DE number 1024051 (Why is no real title available?)
- scientific article; zbMATH DE number 1024102 (Why is no real title available?)
- scientific article; zbMATH DE number 1088902 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- scientific article; zbMATH DE number 1394314 (Why is no real title available?)
- Low-exponent RSA with related messages
- Two practical and provably secure block ciphers: BEAR and LION
Cited in
(30)- On the local leakage resilience of linear secret sharing schemes
- Fault-tolerant quantum secure direct communication protocol based on decoherence-free states
- A scalable post-quantum hash-based group signature
- Enhancing data security in ad hoc networks based on multipath routing
- Quantum public-key cryptosystem
- scientific article; zbMATH DE number 1759790 (Why is no real title available?)
- Exploiting randomness on continuous sets
- Hadamard matrices modulo 5
- Towards a theory of data entanglement
- Linear \((2, p, p)\)-AONTs exist for all primes \(p\)
- All or nothing at all
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- ParaDiSE: efficient threshold authenticated encryption in fully malicious model
- Invertible binary matrices with maximum number of \(2\)-by-\(2\) invertible submatrices
- Breaking the Shin-Shin-Rhee remotely keyed encryption schemes
- Some new results on Hadamard modulo prime matrices
- On security properties of all-or-nothing transforms
- Rectangular, range, and restricted AONTs: three generalizations of all-or-nothing transforms
- A new mode of using all-or-nothing transforms
- Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme
- Incompressible cryptography
- Short leakage resilient and non-malleable secret sharing schemes
- Leakage-resilient coin tossing
- Randomizing encryption mode
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
- An Application of Quasigroups in All-Or-Nothing Transform
- scientific article; zbMATH DE number 1418314 (Why is no real title available?)
- Network information flow
- Efficient Traitor Tracing from Collusion Secure Codes
This page was built for publication: All-or-nothing encryption and the package transform
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639342)