-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Transactions on Information Theory 48(6), 1668-1680 (2002)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
2
-
-
0032313750
-
Oblivious transfer with a memory-bounded receiver
-
IEEE Computer Society Press, Los Alamitos
-
Cachin, C., Crépeau, C., Marcil, J.: Oblivious transfer with a memory-bounded receiver. In: 39th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 493-502. IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
39th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 493-502
-
-
Cachin, C.1
Crépeau, C.2
Marcil, J.3
-
3
-
-
38049138207
-
A tight high-order entropic quantum uncertainty relation with applications
-
Menezes, A, ed, CRYPTO, Springer, Heidelberg
-
Damgård, I.B., Fehr, S., Renner, R., Salvail, L., Schaffner, C.: A tight high-order entropic quantum uncertainty relation with applications. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 360-378. Springer, Heidelberg
-
(2007)
LNCS
, vol.4622
, pp. 360-378
-
-
Damgård, I.B.1
Fehr, S.2
Renner, R.3
Salvail, L.4
Schaffner, C.5
-
4
-
-
33748633496
-
Cryptography in the bounded quantum-storage model
-
IEEE Computer Society Press, Los Alamitos
-
Damgård, I.B., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 449-458. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
46th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 449-458
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
5
-
-
38049149442
-
-
available at
-
Damgård, I.B., Fehr, S., Salvail, L., Schaffner, C.: Secure identification and QKD in the bounded-quantum-storage model (2007), available at http://eprint.iacr.org/2007/
-
(2007)
Secure identification and QKD in the bounded-quantum-storage model
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
6
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
8
-
-
35048832981
-
On generating the initial key in the bounded-storage model
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dziembowski, S., Maurer, U.M.: On generating the initial key in the bounded-storage model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 126-137. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 126-137
-
-
Dziembowski, S.1
Maurer, U.M.2
-
9
-
-
1242332560
-
Quantum cryptography in practice
-
Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. In: SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 227-238 (2003)
-
(2003)
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 227-238
-
-
Elliott, C.1
Pearson, D.2
Troxel, G.3
-
11
-
-
0023569922
-
Zero knowledge proofs of identity
-
ACM Press, New York
-
Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: 19th Annual ACM Symposium on Theory of Computing (STOC), pp. 210-217. ACM Press, New York (1987)
-
(1987)
19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
|