![](https://www.pdfsearch.io/img/06156b26ce3b917c44ab5e50db01fe79.jpg) Date: 2006-01-02 00:25:23
| | Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random CiphertexAdd to Reading ListSource URL: www.bmoeller.deDownload Document from Source Website File Size: 252,03 KBShare Document on Facebook
|