Sciweavers

11 search results - page 3 / 3
» Password-Authenticated Group Key Agreement with Adaptive Sec...
Sort
View
IACR
2011
88views more  IACR 2011»
13 years 11 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...