Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms

From MaRDI portal
Publication:2900243