Secure authentication from a weak key, without leaking information (0)

by Niek J Bouman, Serge Fehr
Venue:In Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques