Innovative approaches for security of small artefacts
From MaRDI portal
Publication:465672
DOI10.1016/j.cosrev.2010.09.002zbMath1298.68078OpenAlexW138484237MaRDI QIDQ465672
Giuseppe Persiano, Angelo De Caro, Carlo Blundo, Shlomi Dolev, Marina Kopeetsky, Niv Gilboa, Paul G. Spirakis
Publication date: 24 October 2014
Published in: Computer Science Review (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cosrev.2010.09.002
Network design and communication in computer systems (68M10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to computer science (68-02)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Encryption against storage-bounded adversaries from on-line strong extractors
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Tight security proofs for the bounded-storage model
- Everlasting security in the bounded storage model
- Identity-Based Encryption from the Weil Pairing
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Innovative approaches for security of small artefacts