Cryptology ePrint Archive: Report 2013/869

Available versions in chronological order


How to Fake Auxiliary Input
Dimitar Jetchev and Krzysztof Pietrzak
Original publication (in the same form): IACR-TCC-2014


[ Cryptology ePrint archive ]