-
2
-
-
79958074367
-
A forward-secure digital signature scheme
-
Mihir Bellare and Sara K. Miner. A forward-secure digital signature scheme. In CRYPTO, pages 431-448, 1999.
-
(1999)
CRYPTO
, pp. 431-448
-
-
Bellare, M.1
Miner, S.K.2
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT, pages 139-155, 2000.
-
(2000)
EUROCRYPT
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232-249, 1993.
-
(1993)
CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
33749228136
-
Randomness-efficient oblivious sampling
-
Mihir Bellare and John Rompel. Randomness-efficient oblivious sampling. In FOCS, pages 276-287, 1994.
-
(1994)
FOCS
, pp. 276-287
-
-
Bellare, M.1
Rompel, J.2
-
6
-
-
35248891000
-
Forward-security in private-key cryptography
-
Mihir Bellare and Bennet S. Yee. Forward-security in private-key cryptography. In CT-RSA, pages 1-18, 2003.
-
(2003)
CT-RSA
, pp. 1-18
-
-
Bellare, M.1
Yee, B.S.2
-
7
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Conference on Computer and Communications Security, pages 244-250, 1993.
-
(1993)
ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
8
-
-
24944501364
-
Secure remote authentication using biometric data
-
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith. Secure remote authentication using biometric data. In EUROCRYPT, pages 147-163, 2005.
-
(2005)
EUROCRYPT
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
9
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Victor Boyko, Philip D. MacKenzie, and Sarvar Patel. Provably secure password-authenticated key exchange using diffie-hellman. In EUROCRYPT, pages 156-171, 2000.
-
(2000)
EUROCRYPT
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
11
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, and Amit Sahai. Exposure-resilient functions and all-or-nothing transforms. In EUROCRYPT, pages 453-469, 2000.
-
(2000)
EUROCRYPT
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
12
-
-
35048875340
-
On the random-oracle methodology as applied to length-restricted signature schemes
-
Ran Canetti, Oded Goldreich, and Shai Halevi. On the random-oracle methodology as applied to length-restricted signature schemes. In TCC, pages 40-57, 2004.
-
(2004)
TCC
, pp. 40-57
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Ran Canetti, Shai Halevi, and Jonathan Katz. A forward-secure public-key encryption scheme. In EUROCRYPT, pages 255-271, 2003.
-
(2003)
EUROCRYPT
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
14
-
-
24944566824
-
Universally composable password-based key exchange
-
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, and Philip D. MacKenzie. Universally composable password-based key exchange. In EUROCRYPT, pages 404-421, 2005.
-
(2005)
EUROCRYPT
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.D.5
-
15
-
-
33745629609
-
-
Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. Perfectly secure password protocols in the bounded retrieval model. In TCC, pages 225-244, 2006.
-
Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. Perfectly secure password protocols in the bounded retrieval model. In TCC, pages 225-244, 2006.
-
-
-
-
16
-
-
26444473627
-
Protecting secret data from insider attacks
-
David Dagon, Wenke Lee, and Richard J. Lipton. Protecting secret data from insider attacks. In Financial Cryptography, pages 16-30, 2005.
-
(2005)
Financial Cryptography
, pp. 16-30
-
-
Dagon, D.1
Lee, W.2
Lipton, R.J.3
-
17
-
-
35248884707
-
Intrusion-resilient public-key encryption
-
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, and Moti Yung. Intrusion-resilient public-key encryption. In CT-RSA, pages 19-32, 2003.
-
(2003)
CT-RSA
, pp. 19-32
-
-
Dodis, Y.1
Franklin, M.K.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
18
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, and Adam Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. In CRYPTO, pages 232-250, 2006.
-
(2006)
CRYPTO
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
19
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. Key-insulated public key cryptosystems. In EUROCRYPT, pages 65-82, 2002.
-
(2002)
EUROCRYPT
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
20
-
-
35248813300
-
Strong key-insulated signature schemes
-
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. Strong key-insulated signature schemes. In Public Key Cryptography, pages 130-144, 2003.
-
(2003)
Public Key Cryptography
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
21
-
-
36348947793
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive
-
Report 2003/235
-
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
22
-
-
33745532541
-
Intrusion-resilience via the bounded-storage model
-
Stefan Dziembowski. Intrusion-resilience via the bounded-storage model. In TCC, pages 207-224, 2006.
-
(2006)
TCC
, pp. 207-224
-
-
Dziembowski, S.1
-
23
-
-
33749583877
-
On forward-secure storage
-
Stefan Dziembowski. On forward-secure storage. In CRYPTO, pages 251-270, 2006.
-
(2006)
CRYPTO
, pp. 251-270
-
-
Dziembowski, S.1
-
24
-
-
84880888233
-
Session-key generation using human passwords only
-
Oded Goldreich and Yehuda Lindell. Session-key generation using human passwords only. In CRYPTO, pages 408-432, 2001.
-
(2001)
CRYPTO
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
25
-
-
84937422774
-
Sibir: Signer-base intrusion-resilient signatures
-
Moti Yung, editor, CRYPTO, of, Springer
-
Gene Itkis and Leonid Reyzin. Sibir: Signer-base intrusion-resilient signatures. In Moti Yung, editor, CRYPTO, volume 2442 of Lecture Notes in Computer Science, pages 499-514. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
26
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
27
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels iii: Privacy amplification
-
Ueli Maurer and Stefan Wolf. Secret-key agreement over unauthenticated public channels iii: Privacy amplification. IEEE Transactions on Information Theory, 49(4):839-851, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
29
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrarily weak secret
-
Renato Renner and Stefan Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In CRYPTO, pages 78-95, 2003.
-
(2003)
CRYPTO
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
30
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded storage model
-
Salil P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded storage model. Journal of Cryptology, 17(1):43-77, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
31
-
-
84947780088
-
Strong security against active attacks in information-theoretic secret-key agreement
-
Stefan Wolf. Strong security against active attacks in information-theoretic secret-key agreement. In ASIACRYPT, pages 405-419, 1998.
-
(1998)
ASIACRYPT
, pp. 405-419
-
-
Wolf, S.1
|