Sign in
Cryptography from Sunspots: How to Use an Imperfect Reference String.
Ran Canetti
Rafael Pass
Abhi Shelat
Published in:
FOCS (2007)
Keyphrases
</>
cellular automata
automatically detecting
data structure
string matching
real world
pattern matching
data mining
edit distance
hamming distance
genetic algorithm
reference frame
binary strings
proximity graph