A similar attack to CPA, but the attacker can request cipher texts of additional plaintexts after they retrieve the initial ciphertexts.
A similar attack to CPA, but the attacker can request cipher texts of additional plaintexts after they retrieve the initial ciphertexts.