Sciweavers

11 search results - page 3 / 3
» Password-Authenticated Group Key Agreement with Adaptive Sec...
Sort
View
IACR
2011
88views more  IACR 2011»
12 years 6 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...