@dblp

Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.

, , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 134-153. Springer, (2013)

Links and resources

Tags