International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Intrusion-Resilience Via the Bounded-Storage Model

Authors:
Stefan Dziembowski
Download:
DOI: 10.1007/11681878_11
URL: https://iacr.org/archive/tcc2006/38760207/38760207.pdf
Search ePrint
Search Google
Conference: TCC 2006
BibTeX
@inproceedings{tcc-2006-3654,
  title={Intrusion-Resilience Via the Bounded-Storage Model},
  booktitle={Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={3876},
  pages={207-224},
  url={https://iacr.org/archive/tcc2006/38760207/38760207.pdf},
  doi={10.1007/11681878_11},
  author={Stefan Dziembowski},
  year=2006
}