Inproceedings,

Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.

, , and .
Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 576-594. Springer, (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews