Login / Signup
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
Alon Rosen
Gil Segev
Ido Shahaf
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
information theoretic
data sets
case study
smart card
security protocols
data mining
artificial intelligence
clustering algorithm
data structure
evolutionary algorithm
np complete
constraint satisfaction