Login / Signup
Constrained Keys for Invertible Pseudorandom Functions.
Dan Boneh
Sam Kim
David J. Wu
Published in:
TCC (1) (2017)
Keyphrases
</>
pseudorandom
secret key
uniformly distributed
random number
smart card
random numbers
neural network
data analysis
hash functions
public key
key management
constrained problems
stream cipher