共 42 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[6]
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:501-510
[7]
Chen Y., 2013, J SECUR COMMUN NETW
[9]
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:152-161
[10]
Davì F, 2010, LECT NOTES COMPUT SC, V6280, P121, DOI 10.1007/978-3-642-15317-4_9