Constrained pseudorandom functions from functional encryption

From MaRDI portal






Cites work







This page was built for publication: Constrained pseudorandom functions from functional encryption

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2290626)