KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
Fuyuki KitagawaRyo NishimakiPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- information security
- information assurance
- security requirements
- key management
- security issues
- security policies
- access control
- intrusion detection
- security threats
- computer security
- security analysis
- network security
- case study
- security properties
- security systems
- cyber security
- security model
- security protocols
- security level
- neural network
- computer systems
- security vulnerabilities
- smart card