Login / Signup

Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.

Michael BackesAniket KateSebastian MeiserTim Ruffing
Published in: ACNS (2015)
Keyphrases
  • cellular automata
  • information sources
  • data sources
  • single source
  • databases
  • spread spectrum
  • learning algorithm
  • information systems
  • encryption algorithms