Innovative approaches for security of small artefacts
From MaRDI portal
(Redirected from Publication:465672)
Recommendations
Cites work
- scientific article; zbMATH DE number 1097580 (Why is no real title available?)
- scientific article; zbMATH DE number 1559560 (Why is no real title available?)
- scientific article; zbMATH DE number 2086371 (Why is no real title available?)
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Encryption against storage-bounded adversaries from on-line strong extractors
- Everlasting security in the bounded storage model
- Identity-Based Encryption from the Weil Pairing
- On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)
- Tight security proofs for the bounded-storage model
This page was built for publication: Innovative approaches for security of small artefacts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q465672)