共 52 条
[1]
Chen Y(2018)Regular lossy functions and their applications in leakage-resilient cryptography Theor. Comput. Sci. 739 13-38
[2]
Qin B(2018)Provably secure certificate-based encryption with leakage resilience Theor. Comput. Sci. 711 1-10
[3]
Xue H(2016)A leakage-resilient cca-secure identity-based encryption scheme Comput. J. 59 1066-1075
[4]
Guo Y(2016)Continuous leakage-resilient certificate-based encryption Inf. Sci. 355–356 1-14
[5]
Li J(2016)Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage Secur. Commun. Netw. 9 1016-1024
[6]
Lu Y(2018)Identity-based broadcast encryption with continuous leakage resilience Inf. Sci. 429 177-193
[7]
Zhang Y(2015)Leakage-resilient certificate-based encryption Secur. Commun. Netw. 8 3346-3355
[8]
Zhang F(2016)Certificate-based encryption resilient to key leakage J. Syst. Softw. 116 101-112
[9]
Li J(2017)Continuous leakage-resilient certificateless public key encryption with CCA security Knowl. Syst. 136 27-36
[10]
Teng M(2017)Continuous leakage-resilient public-key encryption scheme with CCA security Comput. J. 60 1161-1172