메뉴 건너뛰기




Volumn 5973 LNCS, Issue , 2010, Pages 1-18

Survey: Leakage resilience and the bounded retrieval model

Author keywords

[No Author keywords available]

Indexed keywords

ABSOLUTE VALUES; DESIGN OF CRYPTOGRAPHIC PRIMITIVES; LEAKAGE MODEL; LEAKAGE-RESILIENCE; PUBLIC KEYS; RETRIEVAL MODELS; SECRET KEY; SIDE CHANNEL ATTACK; TECHNIQUES USED;

EID: 78149275873     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14496-7_1     Document Type: Conference Paper
Times cited : (38)

References (65)
  • 1
    • 84947283407 scopus 로고    scopus 로고
    • From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 418-433. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 418-433
    • Abdalla, M.1    An, J.H.2    Bellare, M.3    Namprempre, C.4
  • 3
    • 0036612020 scopus 로고    scopus 로고
    • Everlasting security in the bounded storage model
    • DOI 10.1109/TIT.2002.1003845, PII S0018944802040178
    • Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Transactions on Information Theory 48(6), 1668-1680 (2002) (Pubitemid 34763564)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.6 , pp. 1668-1680
    • Aumann, Y.1    Ding, Y.Z.2    Rabin, M.O.3
  • 4
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
    • Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 36-54. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 5
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 8
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210-229 (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 9
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • (extended abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 10
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • Bellovin, S.M., Merritt, M.: Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conference on Computer and Communications Security, pp. 244-250 (1993)
    • (1993) ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 11
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 12
    • 78149231337 scopus 로고    scopus 로고
    • CRYPTO 2003. Springer, Heidelberg
    • Boneh, D. (ed.): CRYPTO 2003. LNCS, vol. 2729. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729
    • Boneh, D.1
  • 13
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 14
    • 77954406158 scopus 로고
    • CRYPTO 1992. Springer, Heidelberg
    • Brickell, E.F. (ed.): CRYPTO 1992. LNCS, vol. 740. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740
    • Brickell, E.F.1
  • 16
    • 38049016824 scopus 로고    scopus 로고
    • Intrusion-resilient key exchange in the bounded retrieval model
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Cash, D., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R.J., Walfish, S.: Intrusion-resilient key exchange in the bounded retrieval model. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 479-498. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 479-498
    • Cash, D.1    Ding, Y.Z.2    Dodis, Y.3    Lee, W.4    Lipton, R.J.5    Walfish, S.6
  • 17
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 453-469. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 18
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 20
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 21
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167-226 (2004)
    • (2004) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 23
    • 70350674336 scopus 로고    scopus 로고
    • On cryptography with auxiliary input
    • Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC, pp. 621-630 (2009)
    • (2009) STOC , pp. 621-630
    • Dodis, Y.1    Kalai, Y.T.2    Lovett, S.3
  • 24
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 25
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 26
    • 46749096773 scopus 로고    scopus 로고
    • Intrusion-resilient secret sharing
    • IEEE Computer Society, Los Alamitos
    • Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS, pp. 227-237. IEEE Computer Society, Los Alamitos (2007)
    • (2007) FOCS , pp. 227-237
    • Dziembowski, S.1    Pietrzak, K.2
  • 27
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE Computer Society, Los Alamitos
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293-302. IEEE Computer Society, Los Alamitos (2008)
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 28
    • 84945116168 scopus 로고    scopus 로고
    • On perfect and adaptive security in exposure-resilient cryptography
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposure-resilient cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 301-324. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 301-324
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 29
    • 70350700885 scopus 로고    scopus 로고
    • Non-malleable extractors and symmetric key cryptography from weak secrets
    • Full version
    • Dodis, Y., Wichs, D.: Non-malleable extractors and symmetric key cryptography from weak secrets. In: STOC (2009), Full version, http://eprint.iacr.org/2008/503
    • (2009) STOC
    • Dodis, Y.1    Wichs, D.2
  • 33
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 34
    • 84976826800 scopus 로고
    • Zero Knowledge Proofs of Knowledge in Two Rounds
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Feige, U., Shamir, A.: Zero Knowledge Proofs of Knowledge in Two Rounds. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 526-544. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 526-544
    • Feige, U.1    Shamir, A.2
  • 35
    • 33745184723 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • DOI 10.1007/s00145-006-0233-z
    • Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. J. Cryptology 19(3), 241-340 (2006) (Pubitemid 43911784)
    • (2006) Journal of Cryptology , vol.19 , Issue.3 , pp. 241-340
    • Goldreich, O.1    Lindell, Y.2
  • 36
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
    • Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251-261. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 37
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems. J. ACM 38(3), 691-729 (1991)
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 38
    • 77954654893 scopus 로고    scopus 로고
    • TCC 2006. Springer, Heidelberg
    • Halevi, S., Rabin, T. (eds.): TCC 2006. LNCS, vol. 3876, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 1-20
    • Halevi, S.1    Rabin, T.2
  • 40
    • 33746066725 scopus 로고    scopus 로고
    • Private circuits ii: Keeping secrets in tamperable circuits
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 308-327
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3    Wagner, D.4
  • 42
    • 78149236734 scopus 로고    scopus 로고
    • CRYPTO 1997. Springer, Heidelberg
    • Kaliski Jr., B.S. (ed.): CRYPTO 1997. LNCS, vol. 1294, pp. 1-15. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 1-15
    • Kaliski Jr., B.S.1
  • 44
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 45
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 46
    • 67650667958 scopus 로고    scopus 로고
    • A new randomness extraction paradigm for hybrid encryption
    • Ghilardi, S. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Ghilardi, S. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 590-609
    • Kiltz, E.1    Pietrzak, K.2    Stam, M.3    Yung, M.4
  • 47
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg Full version
    • Kanukurthi, B., Reyzin, L.: Key agreement from close secrets over unsecured channels. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479. Springer, Heidelberg (2009), Full version, http://eprint.iacr.org/2008/494
    • (2009) LNCS , vol.5479
    • Kanukurthi, B.1    Reyzin, L.2
  • 48
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Signature schemes with bounded leakage resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912. Springer, Heidelberg (2009), http://www.mit.edu/ vinodv/papers/asiacrypt09/KV-Sigs.pdf
    • (2009) LNCS , vol.5912
    • Katz, J.1    Vaikuntanathan, V.2
  • 50
    • 84937432504 scopus 로고    scopus 로고
    • Hyper-encryption against space-bounded adversaries from on-line strong extractors
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Lu, C.-J.: Hyper-encryption against space-bounded adversaries from on-line strong extractors. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 257-271. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 257-271
    • Lu, C.-J.1
  • 51
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5(1), 53-66 (1992)
    • (1992) J. Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.M.1
  • 53
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography (extended abstract)
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 55
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009), http://eprint.iacr.org/2009/105
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 56
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM, New York
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: STOC, pp. 33-43. ACM, New York (1989)
    • (1989) STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 57
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43-52 (1996)
    • (1996) J. Comput. Syst. Sci. , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 59
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • Cologne, Germany
    • Pietrzak, K.: A leakage-resilient mode of operation. In: Eurocrypt 2009, Cologne, Germany, pp. 462-482 (2009)
    • (2009) Eurocrypt 2009 , pp. 462-482
    • Pietrzak, K.1
  • 60
    • 78650238574 scopus 로고    scopus 로고
    • Electromagnetic analysis (ema): Measures and counter-measures for smart cards
    • Attali, S., Jensen, T. (eds.) E-smart 2001. Springer, Heidelberg
    • Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 61
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • Gabow, H.N., Fagin, R. (eds.) ACM, New York
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 84-93. ACM, New York (2005)
    • (2005) STOC , pp. 84-93
    • Regev, O.1
  • 62
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM, New York
    • Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: STOC, pp. 387-394. ACM, New York (1990)
    • (1990) STOC , pp. 387-394
    • Rompel, J.1
  • 64
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptology 17(1), 43-77 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 65
    • 78149257068 scopus 로고    scopus 로고
    • CRYPTO 1999. Springer, Heidelberg
    • Wiener, M. (ed.): CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.