Login / Signup
Leakage-Resilient Cryptography from Minimal Assumptions.
Carmit Hazay
Adriana López-Alt
Hoeteck Wee
Daniel Wichs
Published in:
J. Cryptol. (2016)
Keyphrases
</>
cellular automata
artificial intelligence
real time
social networks
artificial neural networks
trade off
special case