您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate

  2. Recent research shows that many public-key or identity-based encryption schemes are vulnerable to side-channel attacks on the keys by the interaction of an adversary with a physical device. To tolerate the possible key leakage, leakage-resilient cryp
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:258048
    • 提供者:weixin_38721811