Login / Signup
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More.
Damiano Abram
Lawrence Roy
Mark Simkin
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
cellular automata
data sets
databases
machine learning
artificial intelligence
social networks
sufficient conditions
basis functions
information security
restrictive assumptions