Verification methods for the computationally complete symbolic attacker based on indistinguishability

From MaRDI portal
Publication:4972166