Inproceedings,

Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.

, , and .
Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 483-500. Springer, (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews