On the real-world security of cryptographic primitives
From theory to practice
More Info
expand_more
expand_more