A computational indistinguishability logic for the bounded storage model
From MaRDI portal
Publication:2889822
Recommendations
- Survey: leakage resilience and the bounded retrieval model
- Leakage-resilient circuits without computational assumptions
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Certified security proofs of cryptographic protocols in the computational model: an application to intrusion resilience
- Key-evolution schemes resilient to space-bounded leakage
Cited in
(4)- scientific article; zbMATH DE number 647706 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Certified security proofs of cryptographic protocols in the computational model: an application to intrusion resilience
- From operational models to information theory; side channels in pGCL with Isabelle
This page was built for publication: A computational indistinguishability logic for the bounded storage model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889822)