Innovative approaches for security of small artefacts
DOI10.1016/J.COSREV.2010.09.002zbMATH Open1298.68078OpenAlexW138484237MaRDI QIDQ465672FDOQ465672
Authors: Carlo Blundo, Angelo De Caro, Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, P. G. Spirakis
Publication date: 24 October 2014
Published in: Computer Science Review (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cosrev.2010.09.002
Recommendations
Research exposition (monographs, survey articles) pertaining to computer science (68-02) Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Network design and communication in computer systems (68M10)
Cites Work
- Identity-Based Encryption from the Weil Pairing
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Encryption against storage-bounded adversaries from on-line strong extractors
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Title not available (Why is that?)
- On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)
- Title not available (Why is that?)
- Tight security proofs for the bounded-storage model
- Title not available (Why is that?)
- Everlasting security in the bounded storage model
This page was built for publication: Innovative approaches for security of small artefacts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q465672)