Cryptology ePrint Archive: Report 2005/179

Available versions in chronological order


Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski

Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski

Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski

Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski


[ Cryptology ePrint archive ]