Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography (0)

Cached

Download Links

by Mihir Bellare , Phillip Rogaway
Citations:62 - 24 self