Login / Signup
Adversarial Examples from Cryptographic Pseudo-Random Generators.
Sébastien Bubeck
Yin Tat Lee
Eric Price
Ilya P. Razenshteyn
Published in:
CoRR (2018)
Keyphrases
</>
pseudorandom
random numbers
random number generators
random number
uniformly distributed
random number generator
secret key
stream cipher
pseudo random number generators
smart card
real time
data mining
feature selection
training examples
security protocols