1. Continuous after-the-fact leakage-resilient key exchange;Alawatugoda,2014
2. Public-key encryption in the bounded-retrieval model;Alwen,2010
3. Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage;Brakerski,2010
4. Intrusion-resilient key exchange in the bounded retrieval model;Cash,2007
5. Strongly leakage-resilient authenticated key exchange;Chen,2016