共 50 条
- [1] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs [J]. Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
- [2] Tightly Secure Encryption Schemes against Related-Key Attacks [J]. COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
- [3] Ciphers secure against related-key attacks [J]. FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370
- [4] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
- [5] Public Key Encryption against Related Key Attacks [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 262 - 279
- [6] Public-Key Encryption Resilient to Linear Related-Key Attacks [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
- [7] Signcryption Secure Against Linear Related-Key Attacks [J]. COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
- [8] Cryptography Secure against Related-Key Attacks and Tampering [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
- [9] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
- [10] ON THE RELATED-KEY ATTACKS AGAINST AES [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400