IACR paper details
Search for the paper
@inproceedings{tcc-2005-3690,
title={Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs},
booktitle={Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
series={Lecture Notes in Computer Science},
publisher={Springer},
volume={3378},
pages={128-149},
url={http://www.iacr.org/cryptodb/archive/2005/TCC/3690/3690.pdf},
doi={10.1007/978-3-540-30576-7_8},
author={Jonathan Katz and Yehuda Lindell},
year=2005
}
Download a complete BibTeX file.