How to Fool an Unbounded Adversary with a Short Key Mar 1, 2006· Alexander Russell , Hong Wang · 0 min read Cite DOI Type 2 Publication IEEE Transactions on Information Theory Last updated on Mar 1, 2006 ← Generic Quantum Fourier Transforms Oct 1, 2006 Distributed Scheduling for Disconnected Cooperation Jan 1, 2006 →