Handling expected polynomial-time strategies in simulation-based security proofs

From MaRDI portal












This page was built for publication: Handling expected polynomial-time strategies in simulation-based security proofs

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1021232)