G.: Security Proof with Dishonest Keys (2012)

by H Comon-Lundh, V Cortier, Scerri
Venue:In Proceedings of Principles of Security and Trust: Second International Conference (POST 2012