Pseudorandom unitaries with non-adaptive security.
Tony MetgerAlexander PorembaMakrand SinhaHenry YuenPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- pseudorandom
- stream cipher
- encryption algorithm
- uniformly distributed
- random number
- secret key
- access control
- security level
- security systems
- high security
- computer security
- statistical databases
- security policies
- random numbers
- functional requirements
- network security
- information security
- information assurance
- security mechanisms
- security threats
- security problems
- real time
- intrusion detection
- low cost
- information systems