Ideal key derivation and encryption in simulation-based security

From MaRDI portal
Publication:3073705












This page was built for publication: Ideal key derivation and encryption in simulation-based security

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073705)