Quantum Cryptography II: How to re-use a one-time pad safely even if P=NPCharles H. BennettGilles Brassardet al.2014Natural Computing
Bayesian versus data driven model selection for microarray dataRaffaele GiancarloGiosué Lo Boscoet al.2014Natural Computing