Perfectly Secure Password Protocols in the Bounded Retrieval Model
暂无分享,去创建一个
Giovanni Di Crescenzo | Richard J. Lipton | Shabsi Walfish | R. Lipton | Shabsi Walfish | G. D. Crescenzo
[1] Giovanni Di Crescenzo,et al. Towards a Theory of Intrusion Detection , 2005, ESORICS.
[2] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[3] Michael Sipser,et al. Expanders, Randomness, or Time versus Space , 1988, J. Comput. Syst. Sci..
[4] David Mazières,et al. The Advanced Computing Systems Association a Future-adaptable Password Scheme a Future-adaptable Password Scheme , 2022 .
[5] Amit Sahai,et al. On Perfect and Adaptive Security in Exposure-Resilient Cryptography , 2001, EUROCRYPT.
[6] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] David C. Feldmeier,et al. UNIX Password Security - Ten Years Later , 1989, CRYPTO.
[9] L. Fortnow. Recent Developments in Explicit Constructions of Extractors , 2002 .
[10] Amnon Ta-Shma,et al. Non-interactive Timestamping in the Bounded-Storage Model , 2009, Journal of Cryptology.
[11] A. Wigderson,et al. ENTROPY WAVES, THE ZIG-ZAG GRAPH PRODUCT, AND NEW CONSTANT-DEGREE , 2004, math/0406038.
[12] Sarvar Patel,et al. Number theoretic attacks on secure password schemes , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[13] Thomas D. Wu. The Secure Remote Password Protocol , 1998, NDSS.
[14] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.
[15] Noam Nisan,et al. More deterministic simulation in logspace , 1993, STOC.
[16] Benny Pinkas,et al. Securing passwords against dictionary attacks , 2002, CCS '02.
[17] Bruce Schneier,et al. Authenticating Secure Tokens Using Slow Memory Access , 1999, Smartcard.
[18] Noam Nisan,et al. Extracting Randomness: A Survey and New Constructions , 1999, J. Comput. Syst. Sci..
[19] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[20] Avi Wigderson,et al. Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[21] Steven M. Bellovin,et al. Encrypted Key Exchange , 2006 .
[22] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[23] David Mazières,et al. A future-adaptive password scheme , 1999 .
[24] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.
[25] Ueli Maurer,et al. Optimal Randomizer Efficiency in the Bounded-Storage Model , 2003, Journal of Cryptology.
[26] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[27] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).