Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307250
DOI10.1007/b97182zbMath1122.94370WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307250
Ueli M. Maurer, Stefan Dziembowski
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Related Items
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes, An Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model, A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval, Fine-grained cryptography revisited, Unnamed Item, Speak much, remember little: cryptography in the bounded storage model, revisited, How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\), Secure identification and QKD in the bounded-quantum-storage model, Long-term security and universal composability, Quantum cryptography beyond quantum key distribution, Secure multiparty computation in the bounded storage model, Authentication in the bounded storage model, Long term confidentiality: a survey, Disappearing cryptography in the bounded storage model, Fine-Grained Cryptography, Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction, A Leakage-Resilient Mode of Operation