scientific article; zbMATH DE number 1088242

From MaRDI portal
Revision as of 23:43, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4364559

zbMath1059.94527MaRDI QIDQ4364559

Ueli M. Maurer, Christian Cachin

Publication date: 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.




Related Items (33)

Separating adaptive streaming from oblivious streaming using the bounded storage modelFine-grained secure computationOn the (im)possibility of non-interactive correlation distillationSecure multiparty computation in the bounded storage modelEverlasting UC commitments from fully malicious PUFsIncompressible cryptographyAuthentication in the bounded storage modelInteractive non-malleable codesLong-term security and universal composabilityRate-1 incompressible encryption from standard assumptionsSpeak much, remember little: cryptography in the bounded storage model, revisitedOne-way functions using algorithmic and classical information theoriesAspects concerning entropy and utilityQuantum cryptography beyond quantum key distributionUnnamed ItemLong term confidentiality: a surveyPublic-key cryptography based on bounded quantum reference framesUsing quantum key distribution for cryptographic purposes: a surveyMemory-sample lower bounds for learning with classical-quantum hybrid memoryBasing Weak Public-Key Cryptography on Strong One-Way FunctionsFine-grained cryptography revisitedFine-grained non-interactive key-exchange without idealized assumptionsNon-interactive timestamping in the bounded-storage modelTight time-space lower bounds for finding multiple collision pairs and their applicationsAnalyzing security protocols using time-bounded task-PIOAsFine-Grained CryptographyA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysBit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal ConstructionThe Symbiosis between Collision and Preimage ResistanceBig-Key Symmetric Encryption: Resisting Key ExfiltrationA Single Initialization Server for Multi-party CryptographyResource-restricted cryptography: revisiting MPC bounds in the proof-of-work eraOn the streaming indistinguishability of a random permutation and a random function







This page was built for publication: