-
1
-
-
0036612020
-
Everlasting security in the Bounded Storage Model
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin. Everlasting security in the Bounded Storage Model. IEEE Transactions on Information Theory, 48(6):1668-1680, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
4
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
CRYPTO'97, Springer
-
C. Cachin and U. Maurer. Unconditional security against memory-bounded adversaries. In CRYPTO'97, volume 1294 of LNCS, pages 292-306. Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
5
-
-
84941155146
-
Intrusionresilient authentication in the Limited Communication Model
-
Report 2005/409
-
D. Cash, Y. Z. Ding, Y. Dodis, W. Lee, R. Lipton, and S. Walfish. Intrusionresilient authentication in the Limited Communication Model. Cryptology ePrint Archive, Report 2005/409, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive
-
-
Cash, D.1
Ding, Y.Z.2
Dodis, Y.3
Lee, W.4
Lipton, R.5
Walfish, S.6
-
6
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private Information Retrieval. Journal of the ACM, 45(6):965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
7
-
-
33745629609
-
Perfectly secure password protocols in the Bounded Retrieval Model
-
Theory of Cryptography Conference'06. Springer
-
G. Di Crescenzo, R. J. Lipton, and S. Walfish. Perfectly secure password protocols in the Bounded Retrieval Model. In Theory of Cryptography Conference'06, volume 3876 of LNCS, pages 225-244. Springer, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.J.2
Walfish, S.3
-
8
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
G. Di Crescenzo, T. Malkin, and R. Ostrovsky. Single Database Private Information Retrieval implies Oblivious Transfer. In EUROCRYPT 2000, pages 122-138, 2000.
-
(2000)
EUROCRYPT 2000
, pp. 122-138
-
-
Di Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
10
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage model
-
Theory of Cryptography Conference. Springer
-
Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel. Constant-Round Oblivious Transfer in the Bounded Storage Model. In Theory of Cryptography Conference, volume 2951 of LNCS, pages 446-472. Springer, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
12
-
-
33745532541
-
Intrusion-resilience via the Bounded-Storage Model
-
Theory of Cryptography Conference. Springer
-
S. Dziembowski. Intrusion-resilience via the Bounded-Storage Model. In Theory of Cryptography Conference, volume 3876 of LNCS, pages 207-224. Springer, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 207-224
-
-
Dziembowski, S.1
-
14
-
-
35048832981
-
On generating the initial key in the Bounded-Storage Model
-
In EUROCRYPT '04. Springer
-
S. Dziembowski and U. Maurer. On generating the initial key in the Bounded-Storage Model. In EUROCRYPT '04, volume 3027 of LNCS, pages 126-137. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 126-137
-
-
Dziembowski, S.1
Maurer, U.2
-
15
-
-
4344699394
-
Optimal randomizer efficiency in the Bounded-Storage Model
-
January
-
S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the Bounded-Storage Model. Journal of Cryptology, 17(1):5-26, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
18
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
22
-
-
84948954750
-
One-way trapdoor permutations are sufficient for non-trivial single-server Private Information Retrieval
-
E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for non-trivial single-server Private Information Retrieval. In EUROCRYPT, pages 104-121, 2000.
-
(2000)
EUROCRYPT
, pp. 104-121
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
23
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
January
-
C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27-42, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.-J.1
-
24
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
25
-
-
35048857905
-
Non-interactive timestamping in the Bounded Storage Model
-
CRYPTO 2004. Springer
-
T. Moran, R. Shaltiel, and A. Ta-Shma. Non-interactive timestamping in the Bounded Storage Model. In CRYPTO 2004, volume 3152 of LNCS, pages 460-476. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 460-476
-
-
Moran, T.1
Shaltiel, R.2
Ta-Shma, A.3
-
26
-
-
33749581172
-
Composition implies adaptive security in Minicrypt
-
May
-
K. Pietrzak. Composition implies adaptive security in Minicrypt, May 2006. accepted to EUROCRYPT 2006.
-
(2006)
EUROCRYPT 2006
-
-
Pietrzak, K.1
-
27
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Fast Software Encryption. Springer
-
R. L. Rivest. All-or-nothing encryption and the package transform. In Fast Software Encryption, volume 1267 of LNCS, pages 210-218. Springer, 1997.
-
(1997)
LNCS
, vol.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
28
-
-
4344628859
-
Constructing locally computable extractors and cryptoSystems in the Bounded-Storage Model
-
January
-
S. P. Vadhan. Constructing locally computable extractors and cryptoSystems in the Bounded-Storage Model. Journal of Cryptology, 17(1):43-77, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
|