共 25 条
[1]
Alawatugoda J(2017)Generic construction of an eck-secure key exchange protocol in the standard model Int. J. Inf. Secur. 16 541-557
[2]
Alawatugoda J(2017)On the leakage-resilient key exchange J. Math. Cryptol. 11 215-269
[3]
Alawatugoda J(2020)Public-key encryption in the standard model against strong leakage adversary Comput. J. 63 1904-1914
[4]
Boneh D(2007)Chosen-ciphertext security from identity-based encryption SIAM J. Comput. 36 1301-1328
[5]
Canetti R(2009)One-round key exchange in the standard model Int. J. Adv. Comput. Technol. 1 181-199
[6]
Halevi S(2017)Strong authenticated key exchange with auxiliary inputs Des. Codes Cryptogr. 85 145-173
[7]
Katz J(2002)Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 541-552
[8]
Boyd C(2019)Strongly leakage resilient authenticated key exchange, revisited Des. Codes Cryptogr. 87 2885-2911
[9]
Cliff Y(undefined)undefined undefined undefined undefined-undefined
[10]
Nieto JMG(undefined)undefined undefined undefined undefined-undefined