Abstract | ||
---|---|---|
Leakage of private information, such as the secret keys, has become a threat to the security of computing systems. It has become a common requirement that cryptographic schemes should withstand various leakage attacks, including the continuous leakage attacks. Although some research progresses have been made toward this area, there are still some unsolved issues. In the literature, the public-key ... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1093/comjnl/bxaa124 | The Computer Journal |
Keywords | DocType | Volume |
public-key encryption,continuous leakage resilience,leakage amplification,CPA security | Journal | 64 |
Issue | ISSN | Citations |
8 | 0010-4620 | 0 |
PageRank | References | Authors |
0.34 | 0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zirui Qiao | 1 | 2 | 2.39 |
Qiliang Yang | 2 | 0 | 1.01 |
Yanwei Zhou | 3 | 22 | 11.90 |
Zhe Xia | 4 | 19 | 8.17 |
Mingwu Zhang | 5 | 1 | 3.74 |