{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:02:28Z","timestamp":1773378148002,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834366","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"1447-1452","source":"Crossref","is-referenced-by-count":0,"title":["On the Security Properties of Combinatorial All-or-nothing Transforms"],"prefix":"10.1109","author":[{"given":"Yujie","family":"Gu","sequence":"first","affiliation":[{"name":"Kyushu University,Graduate School and Faculty of Information Science and Electrical Engineering,Fukuoka,Japan"}]},{"given":"Sonata","family":"Akao","sequence":"additional","affiliation":[{"name":"Kyushu University,Graduate School and Faculty of Information Science and Electrical Engineering,Fukuoka,Japan"}]},{"given":"Navid Nasr","family":"Esfahani","sequence":"additional","affiliation":[{"name":"University of Waterloo,David R. Cheriton School of Computer Science,Waterloo,Canada,N2L 3G1"}]},{"given":"Ying","family":"Miao","sequence":"additional","affiliation":[{"name":"University of Tsukuba,Faculty of Engineering, Information and Systems,Tsukuba, Ibaraki,Japan,305-8573"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Kyushu University,Graduate School and Faculty of Information Science and Electrical Engineering,Fukuoka,Japan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-021-00958-5"},{"key":"ref11","article-title":"On the information-theoretic security of combinatorial all-or-nothing trans-forms","author":"gu","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2670559"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052348"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS.2017.8275110"},{"key":"ref16","author":"stinson","year":"2018","journal-title":"Cryptography Theory and Practice"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00612-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2016.08.016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_23"},{"key":"ref3","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.37236\/6370"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2780233"},{"key":"ref7","article-title":"Generalizations of all-or-nothing transforms and their application in secure distributed storage","author":"esfahani","year":"2021","journal-title":"PhD thesis"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_33"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_32"},{"key":"ref9","first-page":"130","article-title":"Computational results on invertible matrices with the maximum number of invertible 2 &#x00D7; 2 submatrices","volume":"69","author":"esfahani","year":"2017","journal-title":"Australasian Journal of Combinatorics"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834366.pdf?arnumber=9834366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:31Z","timestamp":1773347791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834366\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834366","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}