K. Kurosawa
Lecture Notes in Computer Science
Algebraic Geometric Foundations of Cryptology: The Case of Practical and Unconditionally Secure Computation
Annual International Conference on the Theory and Applications of Cryptology & Information Security

Cramer, R., Hanaoka, G., Hofheinz, D., Imai, H., Kiltz, E., Pass, R., … Vaikuntanathan, V. (2007). Bounded CCA2-Secure Encryption. In K. Kurosawa (Ed.), Proceedings of ASIACRYPT 2007 (pp. 502–518). Springer. doi:10.1007/978-3-540-76900-2