共 50 条
- [41] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
- [42] CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 : 3 - 22
- [44] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
- [45] Revocable Identity-Based Encryption Scheme with Leakage-Resilience [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
- [47] Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security [J]. SYMMETRY-BASEL, 2015, 7 (04): : 1856 - 1881
- [48] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes [J]. Journal of Computer Science and Technology, 2018, 33 : 1243 - 1260