Login / Signup
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
Published in:
Public Key Cryptography (2) (2017)
Keyphrases
</>
probabilistic model
cost function
computational model
mathematical model
formal model
real time
image processing
low cost
statistical model
prior knowledge
digital images
experimental data
theorem proving