Sign in

Leakage-Resilient Cryptography from Minimal Assumptions.

Carmit HazayAdriana López-AltHoeteck WeeDaniel Wichs
Published in: J. Cryptol. (2016)
Keyphrases
  • cellular automata
  • artificial intelligence
  • real time
  • social networks
  • artificial neural networks
  • trade off
  • special case