A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Another Look at "Provable Security". II
[chapter]
2006
Lecture Notes in Computer Science
We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety and difficulty of this question.
doi:10.1007/11941378_12
fatcat:fatlcjwmj5gdthxhx7pylbn3li