12
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Intrusion-Resilient Key Exchange in the Bounded Retrieval Model

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references23

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Universally composable security: a new paradigm for cryptographic protocols

          R. Canetti (2024)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Authenticated Key Exchange Secure against Dictionary Attacks

                Bookmark

                Author and book information

                Book Chapter
                : 479-498
                10.1007/978-3-540-70936-7_26
                1eb63b79-1f4c-4f73-addc-6a2e74288e7f
                History

                Comments

                Comment on this book

                Book chapters

                Similar content2,339

                Cited by8