共 29 条
- [1] Bitansky N., Dachman-Soled D., Lin H., Leakage-tolerant computation with input-independent preprocessing, Proceedings of the CRYPTO'14, pp. 146-167, (2014)
- [2] Kang L., Wang Z.-Y., The efficient CCA secure public-key encryption scheme, Chinese Journal of Computers, 34, 2, pp. 236-242, (2011)
- [3] Dodis Y., Pietrzak K., Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks, Proceedings of the CRYPTO'10, pp. 21-40, (2010)
- [4] Akavia A., Goldwasser S., Vaikuntanathan V., Simultaneous hardcore bits and cryptography against memory attacks, Proceedings of the TCC'09, pp. 474-495, (2009)
- [5] Brakershi Z., Kalai Y.T., Katz J., Vaikuntanathan V., Overcoming the hole in the bucket: Public-key cryptogaphy resilient to continual memory leakage, Proceedings of the FOCS'10, pp. 501-510, (2010)
- [6] Zhang M.-W., Yang B., Takagi T., Master-key leakage-resilient and continue leakage-resilient functional encryption in dual affine spaces, Chinese Journal of Computers, 35, 9, pp. 1856-1867, (2012)
- [7] Dodis Y., Haralambiev K., Lopez-Alt K., Wichs D., Efficient public-key cryptography in the presence of key leakage, Proceedings of the ASIACRYPT'10, pp. 613-631, (2010)
- [8] Alwen J., Dodis Y., Wichs D., Leakage-resilient public-key in the bounded-retrieval model, Proceedings of the CRYPTO'09, pp. 36-54, (2009)
- [9] Yu J., Kong F.Y., Cheng X.G., Et al., Intrusion-resilient identity-based signature: Security definition and construction, Journal of Systems and Software, 85, 2, pp. 382-391, (2012)
- [10] Yu J., Cheng X.-G., Li F.-G., Et al., Provably secure intrusion-resilient public-key encryption scheme in the standard model, Journal of Software, 24, 2, pp. 266-278, (2013)