All-or-nothing encryption and the package transform
From MaRDI portal
Publication:4639342
Recommendations
Cites work
- scientific article; zbMATH DE number 1024051 (Why is no real title available?)
- scientific article; zbMATH DE number 1024102 (Why is no real title available?)
- scientific article; zbMATH DE number 1088902 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- scientific article; zbMATH DE number 1394314 (Why is no real title available?)
- Low-exponent RSA with related messages
- Two practical and provably secure block ciphers: BEAR and LION
Cited in
(30)- scientific article; zbMATH DE number 1418314 (Why is no real title available?)
- Short leakage resilient and non-malleable secret sharing schemes
- Leakage-resilient coin tossing
- Enhancing data security in ad hoc networks based on multipath routing
- Linear \((2, p, p)\)-AONTs exist for all primes \(p\)
- A scalable post-quantum hash-based group signature
- Rectangular, range, and restricted AONTs: three generalizations of all-or-nothing transforms
- An Application of Quasigroups in All-Or-Nothing Transform
- Quantum public-key cryptosystem
- Towards a theory of data entanglement
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Efficient Traitor Tracing from Collusion Secure Codes
- Some new results on Hadamard modulo prime matrices
- On the local leakage resilience of linear secret sharing schemes
- Network information flow
- Invertible binary matrices with maximum number of \(2\)-by-\(2\) invertible submatrices
- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
- Exploiting randomness on continuous sets
- All or nothing at all
- Randomizing encryption mode
- Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme
- On security properties of all-or-nothing transforms
- scientific article; zbMATH DE number 1759790 (Why is no real title available?)
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- ParaDiSE: efficient threshold authenticated encryption in fully malicious model
- Hadamard matrices modulo 5
- Breaking the Shin-Shin-Rhee remotely keyed encryption schemes
- Fault-tolerant quantum secure direct communication protocol based on decoherence-free states
- A new mode of using all-or-nothing transforms
- Incompressible cryptography
This page was built for publication: All-or-nothing encryption and the package transform
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639342)