Practical Non-Malleable Codes from l-more Extractable Hash Functions

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis

Journal title: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16

Journal publisher: ACM Press

Published year: 2016

Published pages: 1317-1328

DOI identifier: 10.1145/2976749.2978352

ISBN: 9781-450341394