Authentication in the bounded storage model (Q2170109): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-07082-2_26 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4285183207 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Everlasting security in the bounded storage model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364559 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783724 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-round oblivious transfer in the bounded storage model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4736825 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message Authentication, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight security proofs for the bounded-storage model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extractor-based time-space lower bounds for learning / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Cryptographic Applications of Random Functions (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple schemes in the bounded storage model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probability Inequalities for Sums of Bounded Random Variables / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Oblivious Transfer in the Bounded-Storage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474165 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticating Pervasive Devices with Human Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Authentication from Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Time-space hardness of learning sparse parities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409123 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditionally-perfect secrecy and a provably-secure randomized cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness is linear in space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing locally computable extractors and cryptosystems in the bounded-storage model / rank
 
Normal rank

Latest revision as of 00:05, 30 July 2024

scientific article
Language Label Description Also known as
English
Authentication in the bounded storage model
scientific article

    Statements

    Authentication in the bounded storage model (English)
    0 references
    0 references
    0 references
    0 references
    30 August 2022
    0 references
    streaming algorithm
    0 references
    unconditionally secure cryptographic schemes
    0 references

    Identifiers