共 21 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]
Bo Yang, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P125, DOI 10.1007/978-3-642-33272-2_9
[5]
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[7]
Di Crescenzo G, 2006, LECT NOTES COMPUT SC, V3876, P225
[8]
Storing Secrets on Continually Leaky Devices
[J].
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011),
2011,
:688-697
[9]
Cryptography Against Continuous Memory Attacks
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:511-520
[10]
Dodis Y, 2010, LECT NOTES COMPUT SC, V5978, P361, DOI 10.1007/978-3-642-11799-2_22