Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,178,697 papers from all fields of science
Search
Sign In
Create Free Account
All-or-nothing transform
Known as:
All or nothing protocol
, All-or-nothing protocol
, Aont
Expand
In cryptography, an all-or-nothing transform (AONT), also known as an all-or-nothing protocol, is an encryption mode which allows the data to be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Chaffing and winnowing
Cryptography
Export of cryptography
Forward error correction
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Some Results on the Existence of $t$ -All-or-Nothing Transforms Over Arbitrary Alphabets
Navid Nasr Esfahani
,
I. Goldberg
,
D. Stinson
IEEE Transactions on Information Theory
2018
Corpus ID: 2072089
A <inline-formula> <tex-math notation="LaTeX">$(t, s, v)$ </tex-math></inline-formula>-all-or-nothing transform (AONT) is a…
Expand
2016
2016
All or Nothing at All
P. D'Arco
,
Navid Nasr Esfahani
,
D. Stinson
Electronic Journal of Combinatorics
2016
Corpus ID: 11798839
We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun in \cite{St}. An AONT is a bijective mapping…
Expand
2013
2013
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
R. P. McEvoy
,
Michael Tunstall
,
Claire Whelan
,
Colin C. Murphy
,
W. Marnane
International Journal of Information Security
2013
Corpus ID: 7725732
Side-channel attacks on hardware implementations of cryptographic algorithms have recently been the focus of much attention in…
Expand
Highly Cited
2010
Highly Cited
2010
Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption
Namje Park
,
Youjin Song
Wireless Algorithms, Systems, and Applications
2010
Corpus ID: 39865827
Ensuring the security of RFID's large-capacity database system by depending only on existing encryption schemes is unrealistic…
Expand
Highly Cited
2000
Highly Cited
2000
Exposure-Resilient Functions and All-or-Nothing Transforms
R. Canetti
,
Y. Dodis
,
S. Halevi
,
E. Kushilevitz
,
A. Sahai
International Conference on the Theory and…
2000
Corpus ID: 6903660
We study the problem of partial key exposure. Standard cryptographic definitions and constructions do not guarantee any security…
Expand
Highly Cited
2000
Highly Cited
2000
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
Anand Desai
Annual International Cryptology Conference
2000
Corpus ID: 15138209
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers…
Expand
2000
2000
All-or-Nothing Transform and Remotely Keyed Encription Protocols
Sanguk Shin
,
W. Shin
,
K. Rhee
International Conference on Theory and Practice…
2000
Corpus ID: 20106935
We propose two new Remotely Keyed Encryption protocols; a length-increasing RKE and a length-preserving RKE. The proposed…
Expand
2000
2000
On all-or-nothing transforms and password-authenticated key exchange protocols
V. Boyko
2000
Corpus ID: 954963
This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or…
Expand
Highly Cited
1999
Highly Cited
1999
On the Security Properties of OAEP as an All-or-Nothing Transform
V. Boyko
Annual International Cryptology Conference
1999
Corpus ID: 206632584
This paper studies All-or-Nothing Transforms (AONTs), which have been proposed by Rivest as a mode of operation for block ciphers…
Expand
Highly Cited
1993
Highly Cited
1993
A system of constructor classes: overloading and implicit higher-order polymorphism
Mark P. Jones
Conference on Functional Programming Languages…
1993
Corpus ID: 2486301
Abstract This paper describes a flexible type system that combines overloading and higher-order polymorphism in an implicitly…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE