Login / Signup
Regular lossy functions and their applications in leakage-resilient cryptography.
Yu Chen
Baodong Qin
Haiyang Xue
Published in:
Theor. Comput. Sci. (2018)
Keyphrases
</>
cellular automata
data compression
neural network
machine learning
social networks
feature extraction
computational complexity