共 50 条
- [41] Public-Key Encryption Schemes with Auxiliary Inputs THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +
- [42] Password-Authenticated Public-Key Encryption APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
- [43] Intrusion-resilient public-key encryption TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 19 - 32
- [44] On the Power of Public-Key Encryption in Secure Computation THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
- [46] On the security notions for public-key encryption schemes SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
- [47] Tightly secure signatures and public-key encryption Designs, Codes and Cryptography, 2016, 80 : 29 - 61
- [48] Optimizing public-key encryption for wireless clients 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1050 - 1056
- [50] Public-key encryption and authentication of quantum information Science China Physics, Mechanics and Astronomy, 2012, 55 : 1618 - 1629