From Serge Vaudenay
Chapter 2: Cryptographic Security Models
Security Definitions
EPFL video portal by SWITCH | Terms of service | Disclaimer | EPFL Privacy policy |