Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective

From MaRDI portal
Publication:6107277