{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:40:20Z","timestamp":1737358820284,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401766"},{"type":"electronic","value":"9783540448495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44849-7_7","type":"book-chapter","created":{"date-parts":[[2007,8,10]],"date-time":"2007-08-10T10:26:17Z","timestamp":1186741577000},"page":"7-10","source":"Crossref","is-referenced-by-count":2,"title":["Hyper Encryption and Everlasting Secrets"],"prefix":"10.1007","author":[{"given":"Michael O.","family":"Rabin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,13]]},"reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1668","DOI":"10.1109\/TIT.2002.1003845","volume":"48","author":"Y. Aumann","year":"2002","unstructured":"Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668\u20131680, June 2002.","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-48405-1_5","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 99","author":"Y. Aumann","year":"1999","unstructured":"Yonatan Aumann and Michael O. Rabin. Information theoretically secure communication in the limited storage space model. In Advances in Cryptology\u2014CRYPTO\u2019 99, Lecture Notes in Computer Science, pages 65\u201379. Springer-Verlag, 1999, 15\u201319 August 1999."},{"key":"7_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/BFb0052243","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 97","author":"C. Cachin","year":"1997","unstructured":"Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burton S. Kaliski Jr., editor, Advances in Cryptology \u2014 CRYPTO\u2019 97, volume 1294 of Lecture Notes in Computer Science, pages 292\u2013306. Springer-Verlag, 1997."},{"key":"7_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-36159-6","volume-title":"STACS 2002 \u2014 19th Annual Symposium on Theoretical Aspects of Computer Science","author":"Y. Z. Ding","year":"2002","unstructured":"Yan Zong Ding and Michael O. Rabin. Hyper-encryption and everlasting security (extended abstract). In STACS 2002 \u2014 19th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, pages 1\u201326. Springer-Verlag, 14\u201316 March 2002."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Stefan Dziembowski and Ueli Maurer. Tight security proofs for the bounded-storage model. In Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing, pages 341\u2013350, Montreal, 19\u201321 May 2002.","DOI":"10.1145\/509907.509960"},{"key":"7_CR6","series-title":"Lect Notes Comput Sci","first-page":"18","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 02","author":"C.-J. Lu","year":"2002","unstructured":"Chi-Jen Lu. Hyper-encryption against space-bounded adversaries from online strong extractors. In Advances in Cryptology\u2014CRYPTO\u2019 02, Lecture Notes in Computer Science. Springer-Verlag, 2002, 18\u201322 August 2002. To appear."},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/BF00191321","volume":"5","author":"U. Maurer","year":"1992","unstructured":"Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53\u201366, 1992.","journal-title":"Journal of Cryptology"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, Report 2002\/162, 2002. http:\/\/eprint.iacr.org\/ .","DOI":"10.1007\/978-3-540-45146-4_4"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Complexity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44849-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:26:17Z","timestamp":1737357977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44849-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401766","9783540448495"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-44849-7_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}