共 50 条
- [13] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
- [14] Secure Message Authentication Against Related-Key Attack FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 305 - 324
- [15] Anonymous Signcryption against Linear Related-Key Attacks PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
- [16] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
- [17] Related-Key Attacks Against Full Hummingbird-2 FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 467 - 482
- [18] On the Security of Non-Interactive Key Exchange against Related-Key Attacks IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1910 - 1923
- [19] Related-key boomerang and rectangle attacks ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 507 - 525