Login / Signup
Pseudorandom Functions from LWE: RKA Security and Application.
Nan Cui
Shengli Liu
Yunhua Wen
Dawu Gu
Published in:
ACISP (2019)
Keyphrases
</>
pseudorandom
decision support
database
neural network
nearest neighbor
intrusion detection
application level
stream cipher