@dblp

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy.

, , , and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 409-441. Springer, (2017)

Links and resources

Tags