Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools
暂无分享,去创建一个
David Naccache | Houda Ferradi | Hervé Chabanne | Michel Abdalla | Julien Jainski | D. Naccache | Michel Abdalla | H. Chabanne | Houda Ferradi | Julien Jainski
[1] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[2] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[3] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[4] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[8] Marco Casassa Mont,et al. The HP time vault service: exploiting IBE for timed release of confidential information , 2003, WWW '03.
[9] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[10] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[11] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[12] Kenneth G. Paterson,et al. Time-Specific Encryption , 2010, SCN.