Login / Signup
On the Impossibility of Tight Cryptographic Reductions.
Christoph Bader
Tibor Jager
Yong Li
Sven Schäge
Published in:
EUROCRYPT (2) (2016)
Keyphrases
</>
lower bound
smart card
hash functions
upper bound
worst case
efficient computation
security protocols
key management
digital signature
computational complexity
random number generators
generalization error bounds
cryptographic protocols
s box
wireless sensor networks
multiscale
galois field