“…To resist such leakage attacks, researchers offer leakage-resilient cryptography as a solution. In the past, numerous leakage-resilient signature (LRS) schemes (Galindo and Virek, 2013;Wu et al, 2019;Tseng et al, 2020;Wu et al, 2020b), leakage-resilient encryption (LRE) schemes (Kiltz and Pietrzak, 2010;Galindo et al, 2016;Wu et al, 2018Wu et al, , 2020aTseng et al, 2022), and leakage-resilient authenticated key agreement protocols (Tseng et al, 2021;Peng et al, 2021;Tsai et al, 2022) under various PKS settings have been published in the literature.…”