Multi-instance Security and Its Application to Password-Based Cryptography
From MaRDI portal
Publication:2914267
DOI10.1007/978-3-642-32009-5_19zbMath1296.94080OpenAlexW2160879729MaRDI QIDQ2914267
Stefano Tessaro, Mihir Bellare, Thomas Ristenpart
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_19
Related Items (13)
Polly cracker, revisited ⋮ Tightness subtleties for multi-user PKE notions ⋮ Query-Complexity Amplification for Random Oracles ⋮ Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks ⋮ Multi-instance secure public-key encryption ⋮ Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks ⋮ Salvaging Weak Security Bounds for Blockcipher-Based Constructions ⋮ On the adaptive security of MACs and PRFs ⋮ Cryptographic puzzles and DoS resilience, revisited ⋮ Everybody's a target: scalability in public-key encryption ⋮ Password hashing and preprocessing ⋮ Quantifying the security cost of migrating protocols to practice ⋮ Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited
This page was built for publication: Multi-instance Security and Its Application to Password-Based Cryptography