1. Public-key encryption in the bounded-retrieval model;Alwen,2010
2. Efficient public-key cryptography with bounded leakage and tamper resilience;Faonio,2016
3. Leakage-resilient cryptography from minimal assumptions;Hazay,2013
4. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks;Liu,2013
5. Public-key cryptosystems resilient to key leakage;Naor,2009