Inproceedings,

Cryptography from Sunspots: How to Use an Imperfect Reference String.

, , and .
FOCS, page 249-259. IEEE Computer Society, (2007)

Meta data

Tags

Users

  • @dblp

Comments and Reviews