共 50 条
- [22] Secure evolutionary hardware for public-key cryptosystems CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
- [23] Elliptic curve public-key cryptosystems - An introduction STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
- [24] Secure evolvable hardware for public-key cryptosystems New Generation Computing, 2005, 23 : 259 - 275
- [29] Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 501 - 510
- [30] Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 36 - 54