Login / Signup
Lossy Cryptography from Code-Based Assumptions.
Quang Dao
Aayush Jain
Published in:
CoRR (2024)
Keyphrases
</>
cellular automata
data compression
source code
information security
fully functional
wavelet image compression
data sets
genetic algorithm
case study
static analysis
code generation
simplifying assumptions
wavelet compression