The following pages link to Privacy with Imperfect Randomness (Q3457080):
Displaying 6 items.
- Cryptographic pseudorandom generators can make cryptosystems problematic (Q2061967) (← links)
- Learning under \(p\)-tampering poisoning attacks (Q2202514) (← links)
- A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes (Q2660907) (← links)
- Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources (Q2794527) (← links)
- Randomness in Private Computations (Q4377451) (← links)
- On secret sharing, randomness, and random-less reductions for secret sharing (Q6114236) (← links)