Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307250
DOI10.1007/b97182zbMath1122.94370OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307250
Ueli M. Maurer, Stefan Dziembowski
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Related Items (17)
How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) ⋮ Secure multiparty computation in the bounded storage model ⋮ Authentication in the bounded storage model ⋮ Long-term security and universal composability ⋮ Speak much, remember little: cryptography in the bounded storage model, revisited ⋮ Quantum cryptography beyond quantum key distribution ⋮ Disappearing cryptography in the bounded storage model ⋮ Unnamed Item ⋮ Long term confidentiality: a survey ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes ⋮ A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval ⋮ Fine-grained cryptography revisited ⋮ A Leakage-Resilient Mode of Operation ⋮ Fine-Grained Cryptography ⋮ Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction ⋮ An Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004