Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. In Josef Pieprzyk, Suriadi Suriadi, editors, Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I. Volume 10342 of Lecture Notes in Computer Science, pages 343-362, Springer, 2017. [doi]
@inproceedings{ChakrabortyPR17, title = {Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE}, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, year = {2017}, doi = {10.1007/978-3-319-60055-0_18}, url = {https://doi.org/10.1007/978-3-319-60055-0_18}, researchr = {https://researchr.org/publication/ChakrabortyPR17}, cites = {0}, citedby = {0}, pages = {343-362}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I}, editor = {Josef Pieprzyk and Suriadi Suriadi}, volume = {10342}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-60055-0}, }