Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.

Posted by