Login / Signup

Constrained Keys for Invertible Pseudorandom Functions.

Dan BonehSam KimDavid J. Wu
Published in: TCC (1) (2017)
Keyphrases
  • pseudorandom
  • secret key
  • uniformly distributed
  • random number
  • smart card
  • random numbers
  • neural network
  • data analysis
  • hash functions
  • public key
  • key management
  • constrained problems
  • stream cipher