Cited By
View all- Jetchev DPietrzak K(2014)How to Fake Auxiliary InputTheory of Cryptography10.1007/978-3-642-54242-8_24(566-590)Online publication date: 2014
- Bibak K(2013)Additive Combinatorics: With a View Towards Computer Science and Cryptography—An ExpositionNumber Theory and Related Fields10.1007/978-1-4614-6642-0_4(99-128)Online publication date: 5-Apr-2013
- Kohayakawa YLee SRödl VSamotij W(2013)The number of Sidon sets and the maximum size of Sidon sets contained in a sparse random set of integersRandom Structures & Algorithms10.1002/rsa.2049646:1(1-25)Online publication date: 3-Apr-2013
- Show More Cited By