Cryptology ePrint Archive: Report 2014/429
Available versions in chronological order
20140611:191237 (posted 11-Jun-2014 19:12:37 UTC)
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven
Original publication (with major differences): IACR-CRYPTO-2014
[
Cryptology ePrint archive
]