Author:
Papakonstantinou Periklis A.,Yang Guang
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography with constant input locality. Journal of Cryptology, 429–469; In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 92–110. Springer, Heidelberg (2007)
2. Chen, J., Yap, C.-K.: Reversal complexity. SIAM Journal on Computing 20(4), 622–638 (1991)
3. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? In: ICS, pp. 1–19 (2010)
4. Impagliazzo, R., Levin, L.A., Luby, M.: In: Symposium on Theory of Computing (STOC), pp. 12–24 (1989)
5. Vadhan, S.P., Zheng, C.J.: Characterizing pseudoentropy and simplifying pseudorandom generator constructions. In: Symposium on Theory of Computing (STOC), pp. 817–836 (2012)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Survey on cyberspace security;Science China Information Sciences;2015-11