Login / Signup
Authentication in the Bounded Storage Model.
Yevgeniy Dodis
Willy Quach
Daniel Wichs
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
computational model
experimental data
objective function
theoretical framework
high level
probabilistic model
em algorithm
process model