Sign in

Post-challenge leakage in public-key encryption.

Zongyang ZhangSherman S. M. ChowZhenfu Cao
Published in: Theor. Comput. Sci. (2015)
Keyphrases
  • public key encryption
  • proxy re encryption