Return to Article Details Constructing Committing and Leakage-Resilient Authenticated Encryption Download Download PDF