Sciweavers

626 search results - page 126 / 126
» Satisfying Maintenance Goals
Sort
View
IACR
2011
73views more  IACR 2011»
12 years 4 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr