共 50 条
- [31] Efficient leakage-resilient public key encryption from DDH assumption CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
- [33] Leakage-Resilient Cryptography PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
- [34] A New Leakage-Resilient IBE Scheme in the Relative Leakage Model DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 263 - 270
- [36] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
- [38] Security of a leakage-resilient protocol for key establishment and mutual authentication (Extended abstract) PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 169 - +
- [40] Provably leakage-resilient three-party password-based authenticated key exchange Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173