Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.评价结果

评估详情

3