Security proof with dishonest keys

Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri. Security proof with dishonest keys. IACR Cryptology ePrint Archive, 2012:8, 2012. [doi]

Authors

Hubert Comon-Lundh

This author has not been identified. Look up 'Hubert Comon-Lundh' in Google

Véronique Cortier

This author has not been identified. Look up 'Véronique Cortier' in Google

Guillaume Scerri

This author has not been identified. Look up 'Guillaume Scerri' in Google