Theory of Cryptography
From MaRDI portal
Publication:5711668
DOI10.1007/b106171zbMath1079.05091OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711668
Moni Naor, Eran Tromer, Asaf Nussboim
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Related Items (3)
Deterministic extractors for affine sources over large fields ⋮ Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error ⋮ Cryptographic hash functions from sequences of lifted Paley graphs
This page was built for publication: Theory of Cryptography