Login / Signup
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Michael Backes
Aniket Kate
Sebastian Meiser
Tim Ruffing
Published in:
ACNS (2015)
Keyphrases
</>
cellular automata
information sources
data sources
single source
databases
spread spectrum
learning algorithm
information systems
encryption algorithms