Abstract
In this paper, we consider the setting where a party uses correlated random tapes across multiple executions of a cryptographic algorithm. We ask if t......
小提示:本篇文献需要登录阅读全文,点击跳转登录