@dblp

Spooky Encryption and Its Applications.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 93-122. Springer, (2016)

Links and resources

Tags