Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

Published: 01 Jan 2016, Last Modified: 11 Nov 2024Secur. Commun. Networks 2016EveryoneRevisionsBibTeXCC BY-SA 4.0
Loading