메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 126-137

On generating the initial key in the bounded-storage model

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; INFORMATION THEORY; NETWORK SECURITY;

EID: 35048832981     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_8     Document Type: Article
Times cited : (61)

References (17)
  • 2
    • 84957084138 scopus 로고    scopus 로고
    • Information theoretically secure communication in the limited storage space model
    • Y. Aumann and M. O. Rabin. Information theoretically secure communication in the limited storage space model. Advances in Cryptology - CRYPTO '99, 65-79, 1999.
    • (1999) Advances in Cryptology - CRYPTO '99 , pp. 65-79
    • Aumann, Y.1    Rabin, M.O.2
  • 3
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memory-bounded adversaries
    • C. Cachin and U. Maurer. Unconditional security against memory-bounded adversaries. Advances in Cryptology - CRYPTO '97, 292-306, 1997.
    • (1997) Advances in Cryptology - CRYPTO '97 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 8
    • 84880895217 scopus 로고    scopus 로고
    • Oblivious transfer in the bounded storage model
    • Y. Z. Ding. Oblivious transfer in the bounded storage model. Advances in Cryptology - CRYPTO 2001, 155-170, 2001.
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 155-170
    • Ding, Y.Z.1
  • 14
    • 84937432504 scopus 로고    scopus 로고
    • Hyper-encryption against space-bounded adversaries from on-line strong extractors
    • C. Lu. Hyper-encryption against space-bounded adversaries from on-line strong extractors. Advances in Cryptology - CRYPTO 2002, 257-271, 2002.
    • (2002) Advances in Cryptology - CRYPTO 2002 , pp. 257-271
    • Lu, C.1
  • 15
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1): 53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 16
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • U. Maurer. Secret key agreement by public discussion. IEEE Transactions on Information Theory, 39(3): 733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 17
    • 35248849411 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded storage model
    • S. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Advances in Cryptology - CRYPTO 2003, 61-77, 2003.
    • (2003) Advances in Cryptology - CRYPTO 2003 , pp. 61-77
    • Vadhan, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.