Author:
Zhou Yanwei,Xu Ran,Zhang Wenzheng,Xia Zhe,Yang Bo,Gu Chunxiang,Huang Meijuan
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference24 articles.
1. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks;Liu,2013
2. Public-key cryptosystems resilient to key leakage;Naor,2009
3. Efficient chosen ciphertext secure public-key encryption under factoring assumption;Qin;J. Secur. Commun. Netw.,2013
4. Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience;Qin;IET Inf. Secur.,2014
5. A leakage-resilient cca-secure identity-based encryption scheme;Li;Comput. J.,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献