Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
暂无分享,去创建一个
Sen-Shan Huang | Yuh-Min Tseng | Tung-Tso Tsai | Jui-Di Wu | Yuh-Min Tseng | Sen-Shan Huang | Jui-Di Wu | Tung-Tso Tsai
[1] Paz Morillo,et al. Improved certificate-based encryption in the standard model , 2008, J. Syst. Softw..
[2] Siu-Ming Yiu,et al. Identity-Based Encryption Resilient to Continual Auxiliary Leakage , 2012, EUROCRYPT.
[3] Yuh-Min Tseng,et al. Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.
[4] Carmit Hazay,et al. Signature Schemes Secure Against Hard-to-Invert Leakage , 2015, Journal of Cryptology.
[5] Yunlei Zhao,et al. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks , 2013, CT-RSA.
[6] Michael Scott,et al. On the Efficient Implementation of Pairing-Based Protocols , 2011, IMACC.
[7] Eike Kiltz,et al. Leakage Resilient ElGamal Encryption , 2010, ASIACRYPT.
[8] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[9] Yuh-Min Tseng,et al. Efficient Revocable ID-Based Encryption with a Public Channel , 2012, Comput. J..
[10] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[11] Yang Lu,et al. Provably secure certificate-based encryption with leakage resilience , 2017, Theor. Comput. Sci..
[12] Xinyi Huang,et al. Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..
[13] Yevgeniy Dodis,et al. Efficient Public-Key Cryptography in the Presence of Key Leakage , 2010, ASIACRYPT.
[14] Yang Lu,et al. Continuous leakage-resilient certificate-based encryption , 2016, Inf. Sci..
[15] Ueli Maurer,et al. Lower Bounds on Generic Algorithms in Groups , 1998, EUROCRYPT.
[16] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[17] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[18] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[19] Sen-Shan Huang,et al. An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage , 2019, IEEE Systems Journal.
[20] Srinivas Vivek,et al. A Practical Leakage-Resilient Signature Scheme in the Generic Group Model , 2012, Selected Areas in Cryptography.
[21] Yang Lu,et al. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.
[22] Douglas Stebila,et al. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange , 2015, IMACC.
[23] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[24] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[25] Yang Lu,et al. Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model , 2014, J. Inf. Sci. Eng..
[26] Yael Tauman Kalai,et al. Cryptography Resilient to Continual Memory Leakage , 2010 .
[27] Zhe Liu,et al. Implementation of a leakage-resilient ElGamal key encapsulation mechanism , 2016, Journal of Cryptographic Engineering.
[28] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[29] Sen-Shan Huang,et al. Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks , 2019, IEEE Access.
[30] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[31] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[32] Sen-Shan Huang,et al. Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model , 2018, IEEE Access.
[33] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[34] Ying-Hao Hung,et al. A Short Certificate-based Signature Scheme with Provable Security , 2016, Inf. Technol. Control..
[35] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[36] Sen-Shan Huang,et al. Leakage-resilient ID-based signature scheme in the generic bilinear group model , 2016, Secur. Commun. Networks.
[37] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[38] Limin Shen,et al. Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.
[39] Michael Scott,et al. Implementing Cryptographic Pairings on Smartcards , 2006, CHES.
[40] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..
[41] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[42] Zhiwei Wang,et al. Provably secure certificate-based signature scheme without pairings , 2013, Inf. Sci..