Displaying similar documents to “Choosing an attacker by a local derivation”