@dblp

2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness.

, , and . FOCS, page 617-626. IEEE Computer Society, (2009)

Links and resources

Tags