Springer
K. Kurosawa
doi.org/10.1007/978-3-540-76900-2
Lecture Notes in Computer Science
Algebraic Geometric Foundations of Cryptology: The Case of Practical and Unconditionally Secure Computation
Annual International Conference on the Theory and Applications of Cryptology & Information Security
Cryptology

Cramer, R.J.F, Hanaoka, G, Hofheinz, D, Imai, H, Kiltz, E, Pass, R, … Vaikuntanathan, V. (2007). Bounded CCA2-Secure Encryption. In K Kurosawa (Ed.), Proceedings of ASIACRYPT 2007 (pp. 502–518). Springer. doi:10.1007/978-3-540-76900-2