Login / Signup
Constraining Pseudorandom Functions Privately.
Dan Boneh
Kevin Lewi
David J. Wu
Published in:
Public Key Cryptography (2) (2017)
Keyphrases
</>
pseudorandom
uniformly distributed
secret key
random number
encryption algorithm
database
real time
artificial intelligence
multiscale
artificial neural networks
nearest neighbor
dimensionality reduction
multi dimensional
smart card
stream cipher