1. Ran Canetti , Yevgeniy Dodis , Shai Halevi , Eyal Kushilevitz , Amit Sahai . 2000 . Exposure-resilient functions and all-or-nothing transforms . In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-EUROCRYPT 2000. Springer-Verlag, Berlin, Heidelberg , 453 - 469 . https://doi.org/10.1007/3-540-45539-6_33 . Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai. 2000. Exposure-resilient functions and all-or-nothing transforms. In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-EUROCRYPT 2000. Springer-Verlag, Berlin, Heidelberg, 453-469. https://doi.org/10.1007/3-540-45539-6_33 .
2. R. G. Cascella , Z. Cao , M. Gerla , B. Crispo , R. Battiti . 2008 . Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution . In Proceedings of IFIP Wireless Days Conference. IEEE Press , Piscataway, New Jersey , 1 - 5 . https://doi.org/10.1109/WD.2008.4812894 . R. G. Cascella, Z. Cao, M. Gerla, B. Crispo, R. Battiti. 2008. Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution. In Proceedings of IFIP Wireless Days Conference. IEEE Press, Piscataway, New Jersey, 1-5. https://doi.org/10.1109/WD.2008.4812894 .
3. On the Rank of Random Matrices;Cooper C.;Random Struct. Algorithms,2000
4. All or nothing at all;Arco P. D’;Electronic Journal of Combinatorics,2016
5. Computational results on invertible matrices with the maximum number of invertible 2×2 submatrices;Nasr Esfahani N.;Austral. J. Combinat..,2017