Sign in

Cryptography from Sunspots: How to Use an Imperfect Reference String.

Ran CanettiRafael PassAbhi Shelat
Published in: FOCS (2007)
Keyphrases
  • cellular automata
  • automatically detecting
  • data structure
  • string matching
  • real world
  • pattern matching
  • data mining
  • edit distance
  • hamming distance
  • genetic algorithm
  • reference frame
  • binary strings
  • proximity graph