Login / Signup

Simple and Tight Device-Independent Security Proofs.

Rotem Arnon FriedmanRenato RennerThomas Vidick
Published in: SIAM J. Comput. (2019)
Keyphrases
  • worst case
  • network security
  • theorem prover
  • case study
  • theorem proving
  • data mining
  • lower bound
  • lightweight
  • information security
  • computer security
  • security level
  • security problems
  • security management