Cryptology ePrint Archive: Report 2015/486

Available versions in chronological order


How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers


[ Cryptology ePrint archive ]