Applied Cryptography and Network Security
From MaRDI portal
Publication:4680972
DOI10.1007/B98360zbMATH Open1103.68548OpenAlexW4301861138MaRDI QIDQ4680972FDOQ4680972
Authors: Rui Zhang, Goichiro Hanaoka, Hideki Imai
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (15)
- A first study of improving transposition cryptosystem
- Title not available (Why is that?)
- Title not available (Why is that?)
- Something about all or nothing (transforms)
- Towards a theory of data entanglement
- Linear \((2, p, p)\)-AONTs exist for all primes \(p\)
- All or nothing at all
- Title not available (Why is that?)
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- Rectangular, range, and restricted AONTs: three generalizations of all-or-nothing transforms
- On security properties of all-or-nothing transforms
- Exposure-resilient functions and all-or-nothing transforms
- Title not available (Why is that?)
- Coding and Cryptography
- Title not available (Why is that?)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680972)