How to Fool an Unbounded Adversary with a Short Key Jan 1, 2002· Alexander Russell , Hong Wang · 0 min read Cite DOI Type 1 Publication Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques Last updated on Jan 1, 2002 ← Failure sensitive analysis for parallel algorithm with controlled memory access concurrency Jan 1, 2002 Inapproximability Results for Equations over Finite Groups Jan 1, 2002 →