Springer
K. Kurosawa
doi.org/10.1007/978-3-540-76900-2
Lecture Notes in Computer Science
Algebraic Geometric Foundations of Cryptology: The Case of Practical and Unconditionally Secure Computation
Annual International Conference on the Theory and Applications of Cryptology & Information Security
Cryptology

Cramer, R., Hanaoka, G., Hofheinz, D., Imai, H., Kiltz, E., Pass, R., … Vaikuntanathan, V. (2007). Bounded CCA2-Secure Encryption. In K. Kurosawa (Ed.), Proceedings of ASIACRYPT 2007 (pp. 502–518). Springer. doi:10.1007/978-3-540-76900-2