共 50 条
- [2] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 908 - 938
- [3] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience The Journal of Supercomputing, 2019, 75 : 3099 - 3122
- [4] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
- [5] Public-Key Encryption Resilient to Linear Related-Key Attacks SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
- [6] Continual Leakage-Resilient Hedged Public-Key Encryption COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
- [7] Leakage-Resilient Public-Key Encryption from Obfuscation PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
- [8] Efficient leakage-resilient public key encryption from DDH assumption Cluster Computing, 2013, 16 : 797 - 806
- [10] Efficient leakage-resilient public key encryption from DDH assumption CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806