Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements
Information-theoretic security can based on an assumption about the adversary's memory size.
Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements
Ehud Altman, Kenneth R. Brown, et al.
PRX Quantum
R.B. Morris, Y. Tsuji, et al.
International Journal for Numerical Methods in Engineering
Imran Nasim, Michael E. Henderson
Mathematics