ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
47
views
20
references
Top references
cited by
17
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,638
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Intrusion-Resilience Via the Bounded-Storage Model
other
Author(s):
Stefan Dziembowski
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Renewable Energy - Storage
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Ran Canetti
,
Hugo Krawczyk
(2001)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Authentication and authenticated key exchanges
Whitfield Diffie
,
Paul C. van Oorschot
,
Michael J. Wiener
(1992)
0
comments
Cited
82
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti
,
Shai Halevi
,
Jonathan Katz
(2003)
0
comments
Cited
74
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 207-224
DOI:
10.1007/11681878_11
SO-VID:
5c819d67-d789-470b-bf73-6ab0f343577f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 60
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles
pp. 80
Efficient Blind and Partially Blind Signatures Without Random Oracles
pp. 145
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices
pp. 207
Intrusion-Resilience Via the Bounded-Storage Model
pp. 225
Perfectly Secure Password Protocols in the Bounded Retrieval Model
pp. 265
Calibrating Noise to Sensitivity in Private Data Analysis
pp. 285
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
pp. 305
Efficient Multi-party Computation with Dispute Control
pp. 360
Games and the Impossibility of Realizable Ideal Functionality
pp. 404
Resource Fairness and Composability of Cryptographic Protocols
pp. 581
Chosen-Ciphertext Security from Tag-Based Encryption
Similar content
3,638
Maternal intrusiveness predicts infants’ event‐related potential responses to angry and happy prosody independent of infant frontal asymmetry
Authors:
Rens Huffmeijer
,
Marian J Bakermans-Kranenburg
,
Judit Gervain
Structural covariance of the ventral visual stream predicts posttraumatic intrusion and nightmare symptoms: a multivariate data fusion analysis
Authors:
Nathaniel Harnett
,
Katherine Finegold
,
Lauren Lebois
…
Dynamics of dyke intrusion in the mid-crust of Iceland
Authors:
Julian Drew
,
Robert S White
,
Janet Key
…
See all similar
Cited by
17
A Leakage-Resilient Mode of Operation
Authors:
Krzysztof Pietrzak
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Authors:
Joel Alwen
,
Yevgeniy Dodis
,
Daniel Wichs
Achieving Leakage Resilience through Dual System Encryption
Authors:
Allison Lewko
,
Yannis Rouselakis
,
Brent Waters
See all cited by