Sciweavers

36 search results - page 8 / 8
» A Secure Two Phase Locking Protocol
Sort
View
EUROCRYPT
2004
Springer
14 years 4 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer