On the (In)Security of the BUFF Transform.
Jelle DonSerge FehrYu-Hsuan HuangPatrick StruckPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- information security
- security issues
- intrusion detection
- security problems
- security requirements
- data sets
- computer security
- information assurance
- access control
- network security
- security policies
- security mechanisms
- security level
- data security
- statistical databases
- cyber security
- security protocols
- security systems
- case study
- security threats
- security vulnerabilities
- databases