Login / Signup

Regular lossy functions and their applications in leakage-resilient cryptography.

Yu ChenBaodong QinHaiyang Xue
Published in: Theor. Comput. Sci. (2018)
Keyphrases
  • cellular automata
  • data compression
  • neural network
  • machine learning
  • social networks
  • feature extraction
  • computational complexity