Login / Signup

From Indifferentiability to Constructive Cryptography (and Back).

Ueli MaurerRenato Renner
Published in: TCC (B1) (2016)
Keyphrases
  • cellular automata
  • end users
  • information security
  • database
  • social networks
  • case study
  • encryption algorithms