Cryptology ePrint Archive: Report 2013/323
Available versions in chronological order
20130602:133050 (posted 02-Jun-2013 13:30:50 UTC)
Encryption Schemes with Post-Challenge Auxiliary Inputs
Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu
[
Cryptology ePrint archive
]