Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
48
views
20
references
Top references
cited by
17
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,856
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Intrusion-Resilience Via the Bounded-Storage Model
other
Author(s):
Stefan Dziembowski
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Renewable Energy - Storage
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Ran Canetti
,
Hugo Krawczyk
(2001)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Authentication and authenticated key exchanges
Whitfield Diffie
,
Paul C. van Oorschot
,
Michael J. Wiener
(1992)
0
comments
Cited
82
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti
,
Shai Halevi
,
Jonathan Katz
(2003)
0
comments
Cited
75
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 207-224
DOI:
10.1007/11681878_11
SO-VID:
5c819d67-d789-470b-bf73-6ab0f343577f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 60
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles
pp. 80
Efficient Blind and Partially Blind Signatures Without Random Oracles
pp. 145
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices
pp. 207
Intrusion-Resilience Via the Bounded-Storage Model
pp. 225
Perfectly Secure Password Protocols in the Bounded Retrieval Model
pp. 265
Calibrating Noise to Sensitivity in Private Data Analysis
pp. 285
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
pp. 305
Efficient Multi-party Computation with Dispute Control
pp. 360
Games and the Impossibility of Realizable Ideal Functionality
pp. 404
Resource Fairness and Composability of Cryptographic Protocols
pp. 581
Chosen-Ciphertext Security from Tag-Based Encryption
Similar content
3,856
CEO Greed, Corporate Social Responsibility, and Organizational Resilience to Systemic Shocks
Authors:
Miha Sajko
,
Christophe Boone
,
Tine Buyl
Universal health coverage, economic slowdown and system resilience: Africa’s policy dilemma
Authors:
Giuliano Russo
,
Gerald Bloom
,
David McCoy
Understanding maternal resilience; Lesson learnt from rural mothers caring for a child with a chronic health condition
Authors:
Sally Bristow
,
Kim Usher
,
Tamara Power
…
See all similar
Cited by
17
A Leakage-Resilient Mode of Operation
Authors:
Krzysztof Pietrzak
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Authors:
Joel Alwen
,
Yevgeniy Dodis
,
Daniel Wichs
Achieving Leakage Resilience through Dual System Encryption
Authors:
Allison Lewko
,
Yannis Rouselakis
,
Brent Waters
See all cited by