Cryptology ePrint Archive: Report 2012/008

Available versions in chronological order


Security proof with dishonest keys
Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri
Publication Info: To appear in the proceedings of the conference on Principles of Security and Trust (POST12)


[ Cryptology ePrint archive ]