On the real-world security of cryptographic primitives

From theory to practice

More Info
expand_more

Files