1. Public-key cryptosystems resilient to key leakage;Naor,2009
2. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks;Liu,2013
3. Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter;Qin,2013
4. Leakage-flexible cca-secure public-key encryption: Simple construction and free of pairing;Qin,2014
5. Practical leakage-resilient identity-based encryption from simple assumptions;Chow,2010