共 50 条
- [1] Tightly Secure Encryption Schemes against Related-Key Attacks [J]. COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
- [2] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
- [4] Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 71 - 82
- [5] Encryption Schemes Secure Against Profiling Adversaries [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
- [7] Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 369 - 385
- [8] Attacks against Two Provably Secure Certificateless Signature Schemes [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 246 - +
- [9] Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 578 - 594
- [10] On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 239 - 258