Taming the Adversary

CRYPTO (2000), pp. 353-358

Abstract