Login / Signup

Secure Bit Commitment From Relativistic Constraints.

Jedrzej KaniewskiMarco TomamichelEsther HänggiStephanie Wehner
Published in: IEEE Trans. Inf. Theory (2013)
Keyphrases
  • data sets
  • constraint programming
  • constraint satisfaction
  • security requirements
  • neural network
  • constrained optimization
  • constraint networks
  • resource constraints