The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
From MaRDI portal
Publication:3604445
Recommendations
Cited in
(16)- A lower bound on the key length of information-theoretic forward-secure storage schemes
- Simple schemes in the bounded storage model
- Speak much, remember little: cryptography in the bounded storage model, revisited
- Long term confidentiality: a survey
- Advances in Cryptology - EUROCRYPT 2004
- Optimal randomizer efficiency in the bounded-storage model
- On Everlasting Security in the Hybrid Bounded Storage Model
- Advances in Cryptology - CRYPTO 2003
- Bit commitment in the bounded storage model: tight bound and simple optimal construction
- Everlasting security in the bounded storage model
- scientific article; zbMATH DE number 1418287 (Why is no real title available?)
- Everlasting UC commitments from fully malicious PUFs
- scientific article; zbMATH DE number 177019 (Why is no real title available?)
- Authentication in the bounded storage model
- Quantum cryptography beyond quantum key distribution
- Disappearing cryptography in the bounded storage model
This page was built for publication: The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604445)