Weiqin Chen, Mark Squillante, et al.
AAAI 2025
Information-theoretic security can based on an assumption about the adversary's memory size.
Weiqin Chen, Mark Squillante, et al.
AAAI 2025
Robert E. Cypher, J. Sanz, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence
Eberhard Spiller, Janusz Wilczynski
Proceedings of SPIE 1989
Amotz Bar-Noy, Sudipto Guha, et al.
ACM Transactions on Algorithms