Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources

Michael Backes 0001, Aniket Kate, Sebastian Meiser, Tim Ruffing. Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. In Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis, editors, Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers. Volume 9092 of Lecture Notes in Computer Science, pages 675-695, Springer, 2015. [doi]

@inproceedings{0001KMR15,
  title = {Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources},
  author = {Michael Backes 0001 and Aniket Kate and Sebastian Meiser and Tim Ruffing},
  year = {2015},
  doi = {10.1007/978-3-319-28166-7_33},
  url = {http://dx.doi.org/10.1007/978-3-319-28166-7_33},
  researchr = {https://researchr.org/publication/0001KMR15},
  cites = {0},
  citedby = {0},
  pages = {675-695},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis},
  volume = {9092},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-28165-0},
}