Return to Article Details On Leakage-Resilient Authenticated Encryption with Decryption Leakages Download Download PDF