Innovative approaches for security of small artefacts
暂无分享,去创建一个
Paul G. Spirakis | Angelo De Caro | Shlomi Dolev | Giuseppe Persiano | Carlo Blundo | Marina Kopeetsky | Niv Gilboa | G. Persiano | S. Dolev | P. Spirakis | C. Blundo | M. Kopeetsky | N. Gilboa
[1] David Zuckerman,et al. Randomness-optimal oblivious sampling , 1997, Random Struct. Algorithms.
[2] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[3] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[4] Ueli Maurer,et al. Tight security proofs for the bounded-storage model , 2002, STOC '02.
[5] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.
[6] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[7] Yuval Ishai,et al. On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Simson L. Garfinkel,et al. RFID: Applications, Security, and Privacy , 2005 .
[10] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.
[11] Yonatan Aumann,et al. Everlasting security in the bounded storage model , 2002, IEEE Trans. Inf. Theory.
[12] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.