共 39 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]
Boyle E, 2011, LECT NOTES COMPUT SC, V6632, P89, DOI 10.1007/978-3-642-20465-4_7
[5]
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:501-510
[6]
Choi SG, 2011, LECT NOTES COMPUT SC, V7073, P740, DOI 10.1007/978-3-642-25385-0_40
[7]
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:152-161
[8]
Dodis Y., 2011, FOCS 2011 IN PRESS
[9]
Efficient Public-Key Cryptography in the Presence of Key Leakage
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010,
2010, 6477
:613-631
[10]
Cryptography Against Continuous Memory Attacks
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:511-520