Applied Cryptography and Network Security
From MaRDI portal
Publication:4680972
Recommendations
Cited in
(15)- scientific article; zbMATH DE number 1418314 (Why is no real title available?)
- Linear \((2, p, p)\)-AONTs exist for all primes \(p\)
- Rectangular, range, and restricted AONTs: three generalizations of all-or-nothing transforms
- scientific article; zbMATH DE number 1722684 (Why is no real title available?)
- Coding and Cryptography
- Towards a theory of data entanglement
- scientific article; zbMATH DE number 7528028 (Why is no real title available?)
- A first study of improving transposition cryptosystem
- All or nothing at all
- Something about all or nothing (transforms)
- On security properties of all-or-nothing transforms
- scientific article; zbMATH DE number 1759790 (Why is no real title available?)
- Exposure-resilient functions and all-or-nothing transforms
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- scientific article; zbMATH DE number 1617925 (Why is no real title available?)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680972)