共 33 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]
[Anonymous], NDSS 2000 INT SOC
[4]
Boneh D, 2008, LECT NOTES COMPUT SC, V5157, P108, DOI 10.1007/978-3-540-85174-5_7
[5]
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:501-510
[6]
Brakerski Z, 2010, LECT NOTES COMPUT SC, V6223, P1, DOI 10.1007/978-3-642-14623-7_1
[7]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222
[8]
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:152-161
[9]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45