共 50 条
- [1] Efficient leakage-resilient public key encryption from DDH assumption CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
- [2] Leakage-Resilient Public-Key Encryption from Obfuscation PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
- [3] Continual Leakage-Resilient Hedged Public-Key Encryption COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
- [6] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
- [7] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172