[1]AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [C]// ASIACRYPT '03: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer-Verlag, 2003:452-473.
[2]BENTAHAR K, FARSHIM P, MALONE-LEE J, et al. Generic constructions of identity-based and certificateless KEMs [J]. Journal of Cryptology, 2008,21(2):178-199.
[3]HUANG Q, WONG D S. Generic certificateless encryption in the standard model [C]// IWSEC '07: Proceedings of the 2nd International Workshop on Security. Berlin: Springer-Verlag, 2007:278-291.
[4]LIBERT B, QUISQUATER J J. On constructing certificateless cryptosystems from identity based encryption [C]// PKC '06: Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography. Berlin: Springer-Verlag, 2006:474-490.
[5]YANG G, TAN C H. Certificateless public key encryption: a new generic construction and two pairing-free schemes [J]. Theoretical Computer Science, 2011,412(8/9/10):662-674.
[6]YANG W, ZHANG F, SHEN L. Practical certificateless public key encryption in the standard model [C]// NSS '12: Proceedings of the 6th International Conference on Network and System Security. Berlin: Springer-Verlag, 2012:320-333.
[7]HALDERMAN J A, SCHOEN S D, HENINGER N, et al. Lest we remember: cold-boot attacks on encryption keys [J]. Communications of the ACM, 2009,52(5):91-98.
[8]DODIS Y, PIETRZAK K. Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks [C]// CRYPTO '10: Proceedings of the 30th Annual Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 2010:21-40.
[9]BRUMLEY D, BONEH D. Remote timing attacks are practical [J]. Computer Networks, 2005,48(5):701-716.
[10]GANDOLFI K, MOURTEL C, OLIVIER F. Electromagnetic analysis: concrete results [C]// CHES '01: Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer-Verlag, 2001:251-261.
[11]CHEN C, WANG T, TIAN J. Improving timing attack on RSA-CRT via error detection and correction strategy [J]. Information Sciences, 2013,232:464-474.
[12]AKAVIA A, GOLDWASSER S, VAIKUNTANATHAN V. Simultaneous hardcore bits and cryptography against memory attacks [C]// TCC '09: Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography. Berlin: Springer-Verlag, 2009:474-495.
[13]ALWEN J, DODIS Y, WICHS D. Leakage-resilient public-key cryptography in the bounded-retrieval model [C]// CRYPTO '09: Proceedings of the 29th Annual International Cryptology Conference. Berlin: Springer-Verlag, 2009:36-54.
[14]AKAVIA A, GOLDWASSER S, HAZAY C. Distributed public key schemes secure against continual leakage [C]// Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing. New York: ACM, 2012:155-164.
[15]BRAKERSKI Z, KALAI Y T, KATZ J, et al. Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage [C]// Proceedings of the 2010 51st Annual IEEE Symposium on Foundations of Computer Science. Washington, DC: IEEE Computer Society, 2010:501-510.
[16]HALEVI S, LIN H. After-the-fact leakage in public-key encryption [C]// TCC '11: Proceedings of the 8th Theory of Cryptography Conference. Berlin: Springer-Verlag, 2011:107-124.
[17]KILTZ E, PIETRZAK K. Leakage resilient elgamal encryption [C]// ASIACRYPT '10: Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer-Verlag, 2010:595-612.
[18]NGUYEN M H, TANAKA K, YASUNAGA K. Leakage-resilience of stateless/stateful public-key encryption from hash proofs [C]// ACISP '12: Proceedings of the 17th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2012:208-222.
[19]ZHANG F, SUN Y, ZHANG L, et al. Research on certificateless public key cryptography [J]. Journal of Software, 2011,22(6):1316-1332.(张福泰,孙银霞,张磊,等.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332.)
[20]DODIS Y, REYZIN L, SMITH A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data [C]// EUROCRYPT '04: Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2004:523-540.
[21]GENTRY C. Practical identity-based encryption without random oracles [C]// EUROCRYPT '06: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2006:445-464. |