International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Perfectly Secure Password Protocols in the Bounded Retrieval Model

Authors:
Giovanni Di Crescenzo
Richard J. Lipton
Shabsi Walfish
Download:
DOI: 10.1007/11681878_12
URL: https://iacr.org/archive/tcc2006/38760226/38760226.pdf
Search ePrint
Search Google
Conference: TCC 2006
BibTeX
@inproceedings{tcc-2006-3622,
  title={Perfectly Secure Password Protocols in the Bounded Retrieval Model},
  booktitle={Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={3876},
  pages={225-244},
  url={https://iacr.org/archive/tcc2006/38760226/38760226.pdf},
  doi={10.1007/11681878_12},
  author={Giovanni Di Crescenzo and Richard J. Lipton and Shabsi Walfish},
  year=2006
}