24
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Perfectly Secure Password Protocols in the Bounded Retrieval Model

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Article: not found

          Password security: a case history

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Conditionally-perfect secrecy and a provably-secure randomized cipher

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Extracting Randomness: A Survey and New Constructions

                Bookmark

                Author and book information

                Book Chapter
                2006
                : 225-244
                10.1007/11681878_12
                bc1ba541-7458-4486-91f1-d00879bbd925
                History

                Comments

                Comment on this book

                Book chapters

                Similar content2,924

                Cited by20