共 50 条
- [33] Public-key cryptography on smart cards CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
- [35] Traitor tracing using identity based public-key cryptography Chin J Electron, 2006, 4 (687-691):
- [36] Traitor tracing using identity based public-key cryptography CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 687 - 691
- [37] Efficient Public-Key Cryptography in the Presence of Key Leakage ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631