Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query.
Haodong JiangZhi MaZhenfeng ZhangPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security threats
- high security
- security problems
- inference control
- security vulnerabilities
- computer security
- security mechanisms
- block cipher
- query processing
- chosen plaintext
- database
- response time
- intrusion detection
- relevance feedback
- security issues
- security protocols
- security measures
- java card
- user queries
- denial of service attacks
- malicious attacks
- security risks
- cyber attacks
- information security
- countermeasures
- data sources
- security policies
- security flaws
- security breaches
- cryptographic algorithms
- fault injection
- malicious users
- stream cipher
- access control
- query expansion
- identity theft
- cryptographic protocols
- secure routing
- object oriented databases