Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the Bounded Storage Model. IEEE Transactions on Information Theory 48(6), 1668–1680 (2002)
2. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
3. Cachin, C., Crepeau, C., Marcil, J.: Oblivious transfer with a memory-bounded receiver. In: 39th Annual Symposium on Foundations of Computer Science, pp. 493–502 (1998)
4. Lecture Notes in Computer Science;C. Cachin,1997
5. Cash, D., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R., Walfish, S.: Intrusion-resilient authentication in the Limited Communication Model. Cryptology ePrint Archive, Report 2005/409 (2005), http://eprint.iacr.org/
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献