Show simple item record

dc.contributor.author
Blazy, Olivier
dc.contributor.author
Brouilhet, Laura
dc.contributor.author
Chevalier, Celine
dc.contributor.author
Towa, Patrick
dc.contributor.author
Tucker, Ida
dc.contributor.author
Vergnaud, Damien
dc.date.accessioned
2021-11-25T06:25:10Z
dc.date.available
2021-10-11T08:30:15Z
dc.date.available
2021-10-11T10:09:24Z
dc.date.available
2021-10-12T09:33:49Z
dc.date.available
2021-10-14T12:41:29Z
dc.date.available
2021-11-10T08:02:42Z
dc.date.available
2021-11-24T14:20:02Z
dc.date.available
2021-11-24T14:56:29Z
dc.date.available
2021-11-25T06:25:10Z
dc.date.issued
2021-12-04
dc.identifier.issn
0304-3975
dc.identifier.other
10.1016/j.tcs.2021.09.042
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/508997
dc.identifier.doi
10.3929/ethz-b-000508997
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
Elsevier
en_US
dc.title
Hardware security without secure hardware: How to decrypt with a password and a server
en_US
dc.type
Journal Article
dc.date.published
2021-10-05
ethz.journal.title
Theoretical Computer Science
ethz.journal.volume
895
en_US
ethz.journal.abbreviated
Theor. comp. sci.
ethz.pages.start
178
en_US
ethz.pages.end
211
en_US
ethz.size
34 p.; 54 p. accepted version
en_US
ethz.version.deposit
acceptedVersion
en_US
ethz.identifier.wos
ethz.identifier.scopus
ethz.publication.place
Amsterdam
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::09653 - Paterson, Kenneth / Paterson, Kenneth
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::09653 - Paterson, Kenneth / Paterson, Kenneth
en_US
ethz.date.deposited
2021-10-11T08:30:22Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Embargoed
en_US
ethz.date.embargoend
2023-10-04
ethz.rosetta.installDate
2021-11-10T08:02:49Z
ethz.rosetta.lastUpdated
2022-03-29T16:08:12Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Hardware%20security%20without%20secure%20hardware:%20How%20to%20decrypt%20with%20a%20password%20and%20a%20server&rft.jtitle=Theoretical%20Computer%20Science&rft.date=2021-12-04&rft.volume=895&rft.spage=178&rft.epage=211&rft.issn=0304-3975&rft.au=Blazy,%20Olivier&Brouilhet,%20Laura&Chevalier,%20Celine&Towa,%20Patrick&Tucker,%20Ida&rft.genre=article&rft_id=info:doi/10.1016/j.tcs.2021.09.042&
 Search print copy at ETH Library

Files in this item

Thumbnail

Publication type

Show simple item record