Cryptology ePrint Archive: Report 2013/802

Available versions in chronological order


Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng


[ Cryptology ePrint archive ]