Author:
Li Jiguo,Guo Yuyan,Yu Qihong,Lu Yang,Zhang Yichen,Zhang Futai
Funder
National Natural Science Function of China
Fundamental Research Funds
Natural Science Foundation
Jiangsu Innovation Program for Graduate Education
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference52 articles.
1. On continual leakage of discrete log representations;Agrawal,2013
2. A. Akavia, S. Goldwasser, C. Hazay, Distributed public key schemes secure against continual leakage, in: Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing (PODC'12), pp. 155–164.
3. Simultaneous hardcore bits and cryptography against memory attacks;Akavia,2009
4. Continuous after-the-fact leakage-resilient key exchange;Alawatugoda,2014
5. Public-key encryption in the bounded-retrieval model;Alwen,2010
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献