How To Forget a Secret
- 1 January 1999
- book chapter
- Published by Springer Nature
- p. 500-509
- https://doi.org/10.1007/3-540-49116-3_47
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete LogarithmsPublished by Springer Nature ,2000
- Security amplification by composition: The case of doubly-iterated, ideal ciphersPublished by Springer Nature ,1998
- Proactive public key and signature systemsPublished by Association for Computing Machinery (ACM) ,1997
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Proactive Secret Sharing Or: How to Cope With Perpetual LeakagePublished by Springer Nature ,1995
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Efficient signature generation by smart cardsJournal of Cryptology, 1991
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986