-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6): 1668-1680, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
4
-
-
0013001552
-
Proactive security: Long-term protection against break-ins
-
R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive security: Long-term protection against break-ins. RSA CryptoBytes, 3(1):1-8, 1997.
-
(1997)
RSA CryptoBytes
, vol.3
, Issue.1
, pp. 1-8
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
5
-
-
38049016824
-
Intrusion-resilient key exchange in the bounded retrieval model
-
TCC07, of
-
D. Cash, Y. Z. Ding, Y. Dodis, W. Lee, R. J. Lipton, and S. Walfish. Intrusion-resilient key exchange in the bounded retrieval model. In TCC07, volume 4392 of LNCS, pages 479-498, 2007.
-
(2007)
LNCS
, vol.4392
, pp. 479-498
-
-
Cash, D.1
Ding, Y.Z.2
Dodis, Y.3
Lee, W.4
Lipton, R.J.5
Walfish, S.6
-
7
-
-
33745629609
-
Perfectly secure password protocols in the bounded retrieval model
-
TCC06, of
-
G. Di Crescenzo, R. J. Lipton, and S. Walfish. Perfectly secure password protocols in the bounded retrieval model. In TCC06, volume 3876 of LNCS, pages 225-244, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.J.2
Walfish, S.3
-
10
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2): 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
12
-
-
0023326390
-
Lower bounds on communication complexity
-
P. Duris, Z. Galii, and G. Schnitger. Lower bounds on communication complexity. Inf. Comput., 73(1): 1-22, 1987.
-
(1987)
Inf. Comput
, vol.73
, Issue.1
, pp. 1-22
-
-
Duris, P.1
Galii, Z.2
Schnitger, G.3
-
13
-
-
33745532541
-
Intrusion-Resilience Via the Bounded-Storage Model
-
TCC'06, of, Springer
-
S. Dziembowski. Intrusion-Resilience Via the Bounded-Storage Model. In TCC'06, volume 3876 of LNCS, pages 207-224. Springer, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 207-224
-
-
Dziembowski, S.1
-
14
-
-
33749583877
-
On Forward-Secure Storage
-
CRYPTO'06, of
-
S. Dziembowski. On Forward-Secure Storage. In CRYPTO'06, volume 4117 of LNCS, pages 251-270, 2006.
-
(2006)
LNCS
, vol.4117
, pp. 251-270
-
-
Dziembowski, S.1
-
15
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
January
-
S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
17
-
-
38749087238
-
On the compressibility of np instances and cryptographic applications
-
IEEE
-
D. Harnik and M. Naor. On the compressibility of np instances and cryptographic applications. In FOCS '06, pages 719-728. IEEE, 2006.
-
(2006)
FOCS '06
, pp. 719-728
-
-
Harnik, D.1
Naor, M.2
-
18
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput, 28(4): 1364-1396, 1999.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
19
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
20
-
-
0027599802
-
Secret key agreement by public discussion
-
U. Maurer. Secret key agreement by public discussion. IEEE Transactions on Information Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
21
-
-
85031940329
-
Rounds in communication complexity revisited
-
ACM
-
N. Nisan and A. Widgerson. Rounds in communication complexity revisited. In STOC '91, pages 419-429. ACM, 1991.
-
(1991)
STOC '91
, pp. 419-429
-
-
Nisan, N.1
Widgerson, A.2
-
22
-
-
85012918897
-
Communication complexity
-
ACM
-
C. H. Papadimitriou and M. Sipser. Communication complexity. In STOC, pages 196-200. ACM, 1982.
-
(1982)
STOC
, pp. 196-200
-
-
Papadimitriou, C.H.1
Sipser, M.2
-
23
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
January
-
S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
25
-
-
0001998264
-
Conjugate coding
-
S. Wiesner. Conjugate coding. SIGACT News, 15(1):78-88, 1983.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
26
-
-
85039623622
-
Some complexity questions related to distributive computing (preliminary report)
-
ACM
-
A. Chi-Chih Yao. Some complexity questions related to distributive computing (preliminary report). In STOC '79, pages 209-213. ACM, 1979.
-
(1979)
STOC '79
, pp. 209-213
-
-
Chi-Chih Yao, A.1
|