共 42 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]
Alawatugoda Janaka, 2015, Cryptography and Coding. 15th IMA International Conference, IMACC 2015. Proceedings: LNCS 9496, P277, DOI 10.1007/978-3-319-27239-9_17
[4]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[5]
[Anonymous], 1985, P ADV CRYPT P CRYPTO, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-7{_}5https://link.springer.com/content/pdf/10.1007/3-540-39568-7{_}5.pdf, DOI 10.1007/3-540-39568-7{_}5HTTPS://LINK.SPRINGER.COM/CONTENT/PDF/10.1007/3-540-39568-7{_}5.PDF]
[6]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[8]
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:501-510
[10]
Efficient Public-Key Cryptography in the Presence of Key Leakage
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010,
2010, 6477
:613-631