Author of the publication

Survey: Leakage Resilience and the Bounded Retrieval Model.

, , and . ICITS, volume 5973 of Lecture Notes in Computer Science, page 1-18. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Shorter Bases for Hard Random Lattices., and . Theory Comput. Syst., 48 (3): 535-553 (2011)The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol., , and . IACR Cryptology ePrint Archive, (2018)On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption., , , , , , and . IMA Int. Conf., volume 8308 of Lecture Notes in Computer Science, page 65-84. Springer, (2013)Efficiently Computing Data-Independent Memory-Hard Functions., and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 241-271. Springer, (2016)Public-Key Encryption in the Bounded-Retrieval Model., , , , , and . IACR Cryptology ePrint Archive, (2009)Anonymous Authentication with Shared Secrets., , , , and . LATINCRYPT, volume 8895 of Lecture Notes in Computer Science, page 219-236. Springer, (2014)Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model., , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 36-54. Springer, (2009)Collusion-Preserving Computation., , , and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 124-143. Springer, (2012)Sustained Space Complexity., , and . CoRR, (2017)Towards Practical Attacks on Argon2i and Balloon Hashing., and . IACR Cryptology ePrint Archive, (2016)