Post-quantum Security of Tweakable Even-Mansour, and Applications.
Gorjan AlagicChen BaiJonathan KatzChristian MajenzPatrick StruckPublished in: EUROCRYPT (1) (2024)
Keyphrases
- security issues
- statistical databases
- information security
- intrusion detection
- security mechanisms
- security requirements
- security management
- security threats
- security analysis
- security policies
- information assurance
- network security
- functional requirements
- channel capacity
- lower bound
- quantum inspired
- quantum computing
- data mining
- security measures
- logic circuits
- quantum computation
- security level
- data security
- cyber security
- key management
- rfid tags
- information sharing
- multi class