-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6): 1668-1680, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
2
-
-
84957084138
-
Information theoretically secure communication in the limited storage space model
-
Y. Aumann and M. O. Rabin. Information theoretically secure communication in the limited storage space model. Advances in Cryptology - CRYPTO '99, 65-79, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.O.2
-
3
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
C. Cachin and U. Maurer. Unconditional security against memory-bounded adversaries. Advances in Cryptology - CRYPTO '97, 292-306, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
4
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6): 965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
8
-
-
84880895217
-
Oblivious transfer in the bounded storage model
-
Y. Z. Ding. Oblivious transfer in the bounded storage model. Advances in Cryptology - CRYPTO 2001, 155-170, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 155-170
-
-
Ding, Y.Z.1
-
12
-
-
0034497243
-
Relationship between public key encryption and oblivious transfer
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan. Relationship between public key encryption and oblivious transfer. In 41st Annual Symposium on Foundations of Computer Science, 325-339, 2000.
-
(2000)
41st Annual Symposium on Foundations of Computer Science
, pp. 325-339
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
14
-
-
84937432504
-
Hyper-encryption against space-bounded adversaries from on-line strong extractors
-
C. Lu. Hyper-encryption against space-bounded adversaries from on-line strong extractors. Advances in Cryptology - CRYPTO 2002, 257-271, 2002.
-
(2002)
Advances in Cryptology - CRYPTO 2002
, pp. 257-271
-
-
Lu, C.1
-
15
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1): 53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
16
-
-
0027599802
-
Secret key agreement by public discussion
-
U. Maurer. Secret key agreement by public discussion. IEEE Transactions on Information Theory, 39(3): 733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
17
-
-
35248849411
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
S. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Advances in Cryptology - CRYPTO 2003, 61-77, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 61-77
-
-
Vadhan, S.1
|