Login / Signup
Simple and Tight Device-Independent Security Proofs.
Rotem Arnon Friedman
Renato Renner
Thomas Vidick
Published in:
SIAM J. Comput. (2019)
Keyphrases
</>
worst case
network security
theorem prover
case study
theorem proving
data mining
lower bound
lightweight
information security
computer security
security level
security problems
security management