共 36 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V5973, P1, DOI 10.1007/978-3-642-14496-7_1
[3]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]
Bellare M, 2014, LECT NOTES COMPUT SC, V8874, P102, DOI 10.1007/978-3-662-45608-8_6
[6]
Boyle E, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1235
[8]
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:501-510
[9]
Brakerski Z, 2010, LECT NOTES COMPUT SC, V6223, P1, DOI 10.1007/978-3-642-14623-7_1
[10]
Brzuska C, 2014, LECT NOTES COMPUT SC, V8874, P122, DOI 10.1007/978-3-662-45608-8_7