Sign in

Pseudorandom Functions from LWE: RKA Security and Application.

Nan CuiShengli LiuYunhua WenDawu Gu
Published in: ACISP (2019)
Keyphrases
  • pseudorandom
  • decision support
  • database
  • neural network
  • nearest neighbor
  • intrusion detection
  • application level
  • stream cipher