Login / Signup
Two-Source Extractors Secure against Quantum Adversaries.
Roy Kasher
Julia Kempe
Published in:
APPROX-RANDOM (2010)
Keyphrases
</>
quantum computing
security issues
diffie hellman
quantum computation
authentication scheme
real time
neural network
database systems
multiple sources
security mechanisms
standard model
authentication protocol
bounded rationality
quantum inspired