共 50 条
- [31] Private Key Protected SM2 Scheme for Web3 Ruan Jian Xue Bao/Journal of Software, 2024, 35 (12): : 5621 - 5635
- [32] Identity-Based Encryption Resilient to Continual Auxiliary Leakage ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
- [33] A new construction of leakage-resilient signature Journal of Computational Information Systems, 2010, 6 (02): : 387 - 394
- [35] Secret Sharing based SM2 Digital Signature Generation using Homomorphic Encryption 2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 252 - 256
- [37] Flush-reload cache timing attack on SM2 digital signature algorithm Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (03): : 24 - 29
- [38] A white-box cryptographic SM2 scheme based on space hardness 2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1260 - 1264
- [39] An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
- [40] Continual Leakage-Resilient Hedged Public-Key Encryption COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585