Funder
National Natural Science Foundation of China
Natural Science Foundation
Publisher
Oxford University Press (OUP)
Reference35 articles.
1. Katz J. , Sahai A. and Waters B. (2008) Predicate Encryption Supporting Disjunctions, Polynomial Equations and Inner Products. Proc. EUROCRYPT 08, Istanbul, Turkey, April 13–17, Lecture Notes in Computer Science 4965, pp. 146–162. Springer, Berlin.
2. Akavia A. , Goldwasser S. and Vaikuntanathan V. (2009) Simultaneous Hardcore Bits and Cryptography Against Memory Attacks. Proc. TCC 09, San Francisco, CA, USA, March 15–17, Lecture Notes in Computer Science 5444, pp. 474–495. Springer, Berlin.
3. Alwen J. , Dodis Y. and Naor M. (2010) Public-Key Encryption in the Bounded-retrieval Model. Proc. EUROCRYPT 10, Monaco and Nice, French, May 30–June 3, Lecture Notes in Computer Science 6110, pp. 113–134. Springer, Berlin.
4. Alwen J. , Dodis Y. and Wichs D. (2009) Leakage-Resilient Public-Key in the Bounded-Retrieval Model. Proc. CRYPTO 09, Santa Barbara, USA, August 16-20, Lecture Notes in Computer Science 5677, pp. 36–54. Springer, Berlin.
5. Brakershi Z. , Kalai Y.T. , Katz J. and Vaikuntanathan V. (2010) Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Proc. FOCS 10, Las Vegas, NV, October 23–26, pp. 501–510. IEEE.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献