Login / Signup

Towards automated proofs for asymmetric encryption schemes in the random oracle model.

Judicaël CourantMarion DaubignardCristian EnePascal LafourcadeYassine Lakhnech
Published in: CCS (2008)
Keyphrases
  • security model
  • peer to peer