On Post-compromise Security release_bl75n4itnnh3ba2eh5cckhnmxa

by Katriel Cohn-Gordon, Cas Cremers, Luke Garratt

Published in IEEE Computer Security Foundations Symposium by IEEE.

2016   p164-178

Archived Files and Locations

application/pdf  683.9 kB
file_2jfiipfii5dnhdtbh75q7nmm2m
eprint.iacr.org (web)
web.archive.org (webarchive)
application/pdf  562.5 kB
file_kv5xwlpeinewbddinjcw7uqhiy
web.archive.org (webarchive)
eprint.iacr.org (web)
application/pdf  586.3 kB
file_jfqrzatrhbemzkoj6nfa7zzdpy
web.archive.org (webarchive)
eprint.iacr.org (web)
application/pdf  586.1 kB
file_zu472ekrgngptjz3jis2ipm4ru
eprint.iacr.org (web)
web.archive.org (webarchive)
application/pdf  614.3 kB
file_uqqzcrf5vvac3jrlbczqizfmnu
ora.ox.ac.uk (web)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2016
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: d3ff9304-5158-46a8-a7c2-7228f7e15b0b
API URL: JSON