Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
17
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,924
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Perfectly Secure Password Protocols in the Bounded Retrieval Model
other
Author(s):
Giovanni Di Crescenzo
,
Richard Lipton
,
Shabsi Walfish
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
JMIR: Research Protocols
Most cited references
17
Record
: found
Abstract
: not found
Article
: not found
Password security: a case history
Robert W. Morris
,
Ken Thompson
(1979)
0
comments
Cited
80
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Conditionally-perfect secrecy and a provably-secure randomized cipher
UeliM. Maurer
(1992)
0
comments
Cited
46
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Extracting Randomness: A Survey and New Constructions
Noam Nisan
,
Amnon Ta-Shma
(1999)
0
comments
Cited
41
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 225-244
DOI:
10.1007/11681878_12
SO-VID:
bc1ba541-7458-4486-91f1-d00879bbd925
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 60
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles
pp. 80
Efficient Blind and Partially Blind Signatures Without Random Oracles
pp. 145
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices
pp. 207
Intrusion-Resilience Via the Bounded-Storage Model
pp. 225
Perfectly Secure Password Protocols in the Bounded Retrieval Model
pp. 265
Calibrating Noise to Sensitivity in Private Data Analysis
pp. 285
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
pp. 305
Efficient Multi-party Computation with Dispute Control
pp. 360
Games and the Impossibility of Realizable Ideal Functionality
pp. 404
Resource Fairness and Composability of Cryptographic Protocols
pp. 581
Chosen-Ciphertext Security from Tag-Based Encryption
Similar content
2,924
Why Older Adults (Don't) Use Password Managers
Authors:
Hirak Ray
,
Flynn Wolf
,
Ravi Kuber
…
AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments
Authors:
Muhammad Rizwan Asghar
,
Clemens Zeidler
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
Authors:
Al-Sakib Pathan
,
Choong Hong
See all similar
Cited by
20
Provably Secure Higher-Order Masking of AES
Authors:
Matthieu Rivain
,
Emmanuel Prouff
A Leakage-Resilient Mode of Operation
Authors:
Krzysztof Pietrzak
Masking against Side-Channel Attacks: A Formal Security Proof
Authors:
Emmanuel Prouff
,
Matthieu Rivain
See all cited by