Cryptology ePrint Archive: Report 2013/869
Available versions in chronological order
20131229:115100 (posted 29-Dec-2013 11:51:00 UTC)
How to Fake Auxiliary Input
Dimitar Jetchev and Krzysztof Pietrzak
Original publication (in the same form): IACR-TCC-2014
[
Cryptology ePrint archive
]