@inproceedings{IACR:conf/tcc/CrescenzoLW06, author = {Giovanni Di Crescenzo and Richard J. Lipton and Shabsi Walfish}, title = {Perfectly Secure Password Protocols in the Bounded Retrieval Model}, booktitle = {TCC}, year = {2006}, pages = {225-244}, ee = {http://www.iacr.org/archive/tcc2006/38760226/38760226.pdf}, crossref = {IACR:conf/tcc/2006}, bibsource = {IACR, http://www.iacr.org} } @proceedings{IACR:conf/tcc/2006, editor = {Shai Halevi and Tal Rabin}, title = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, booktitle = {TCC}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3876}, year = {2006}, isbn = {3-540-32731-2}, ee = {http://www.iacr.org/archive/tcc2006/tcc2006.html}, bibsource = {IACR, http://www.iacr.org} }