@dblp

Cryptography from Sunspots: How to Use an Imperfect Reference String.

, , and . FOCS, page 249-259. IEEE Computer Society, (2007)

Links and resources

Tags