×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of isabelle-glew
SECURITY AND VERIFICATION Lecture 3: What kind of attacks are there? - Chosen Ciphertexts Attacks Tamara Rezk INDES TEAM, INRIA January 17 th, 2012.
214 views