Login / Signup
Post-challenge leakage in public-key encryption.
Zongyang Zhang
Sherman S. M. Chow
Zhenfu Cao
Published in:
Theor. Comput. Sci. (2015)
Keyphrases
</>
public key encryption
proxy re encryption