共 50 条
- [1] Signature Schemes Secure Against Hard-to-Invert Leakage [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 422 - 455
- [2] Signature Schemes Secure against Hard-to-Invert Leakage [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 98 - 115
- [3] Functional Encryption Resilient to Hard-to-Invert Leakage [J]. COMPUTER JOURNAL, 2015, 58 (04): : 735 - 749
- [4] Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 422 - 441
- [5] On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 127 - 145
- [8] Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication [J]. Journal of Cryptology, 2007, 20 : 115 - 149
- [9] Confirmer signature schemes secure against adaptive adversaries [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 243 - 258
- [10] Attacks against Two Provably Secure Certificateless Signature Schemes [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 246 - +