Modifying an Enciphering Scheme After Deployment

Author(s):  
Paul Grubbs ◽  
Thomas Ristenpart ◽  
Yuval Yarom
Sign in / Sign up

Export Citation Format

Share Document