Cryptology ePrint Archive: Report 2013/802
Available versions in chronological order
20131201:163851 (posted 01-Dec-2013 16:38:51 UTC)
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
20131202:021756 (posted 02-Dec-2013 02:17:56 UTC)
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
20131203:031302 (posted 03-Dec-2013 03:13:02 UTC)
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
20131207:045602 (posted 07-Dec-2013 04:56:02 UTC)
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
20140225:012157 (posted 25-Feb-2014 01:21:57 UTC)
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
[
Cryptology ePrint archive
]