J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish et al., Public-Key Encryption in the Bounded-Retrieval Model, Advances in Cryptology -EURO- CRYPT 2010, pp.113-134, 2010.
DOI : 10.1007/978-3-642-13190-5_6

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2004, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

D. Boneh, C. Gentry, and M. Hamburg, Space-efficient identity based encryption without pairings, 48th Annual IEEE Symposium on Foundations of Computer Science, pp.647-657, 2007.
DOI : 10.1109/focs.2007.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

X. Boyen, General Ad Hoc Encryption from Exponent Inversion IBE, Advances in Cryptology -EUROCRYPT 2007, pp.394-411, 2007.
DOI : 10.1007/978-3-540-72540-4_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. S. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, Practical leakage-resilient identity-based encryption from simple assumptions, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.152-161, 2010.
DOI : 10.1145/1866307.1866325

J. S. Coron, A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model, Designs, Codes and Cryptography, vol.50, issue.1, pp.115-133, 2009.
DOI : 10.1007/s10623-008-9218-2

Y. Dodis, R. Ostrovsky, L. Reyzin, and . Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008.
DOI : 10.1137/060651380

URL : http://arxiv.org/abs/cs/0602007

S. Dziembowski, Intrusion-Resilience Via the Bounded-Storage Model, Third Theory of Cryptography Conference TCC 2006, pp.207-224, 2006.
DOI : 10.1007/11681878_11

C. Gentry, Practical Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2006, pp.445-464, 2006.
DOI : 10.1007/11426639_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Gentry, C. Peikert, and V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, Proceedings of the fourtieth annual ACM symposium on Theory of computing, STOC 08, pp.197-206, 2008.
DOI : 10.1145/1374376.1374407

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul et al., Lest we remember, Proceedings of the 17th USENIX Security Symposium, pp.45-60, 2008.
DOI : 10.1145/1506409.1506429

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology -CRYPTO 1999, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

A. B. Lewko and B. Waters, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, pp.455-479, 2010.
DOI : 10.1007/978-3-540-78967-3_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Naor and G. Segev, Public-key cryptosystems resilient to key leakage, Advances in Cryptology -CRYPTO 2009, pp.18-35, 2009.
DOI : 10.1137/100813464

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2005, pp.114-127, 2005.
DOI : 10.1007/11426639_7