共 50 条
- [1] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
- [2] Public-Key Encryption Resilient to Linear Related-Key Attacks SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
- [3] ON THE RELATED-KEY ATTACKS AGAINST AES PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
- [4] Homomorphic Authentication Scheme for Proof of Retrievability with Public Verifiability PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 1017 - 1022
- [6] Cryptography Secure against Related-Key Attacks and Tampering ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
- [7] Anonymous Signcryption against Linear Related-Key Attacks PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
- [8] Signcryption Secure Against Linear Related-Key Attacks COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
- [10] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692