共 50 条
- [31] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
- [32] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
- [33] Leakage-Resilient Certificateless Signature Under Continual Leakage Model [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
- [34] On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 129 - 158
- [35] Continuous After-the-Fact Leakage-Resilient Key Exchange [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
- [36] On the Security of a Certificateless Public Key Encryption with Keyword Search [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
- [37] On the Security of a Certificateless Searchable Public Key Encryption Scheme [J]. GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
- [38] Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model [J]. IEEE ACCESS, 2023, 11 : 54448 - 54461
- [39] Memory leakage-resilient searchable symmetric encryption [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84