On the security of pairing-friendly Abelian varieties over non-prime fields.
Naomi BengerManuel CharlemagneDavid Mandell FreemanPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- information security
- security issues
- computer vision
- security policies
- information assurance
- intrusion detection
- network security
- access control
- security requirements
- computer security
- security problems
- data sets
- neural network
- functional requirements
- security mechanisms
- security threats
- statistical databases
- security measures