Login / Signup
From Indifferentiability to Constructive Cryptography (and Back).
Ueli Maurer
Renato Renner
Published in:
TCC (B1) (2016)
Keyphrases
</>
cellular automata
end users
information security
database
social networks
case study
encryption algorithms