Post-quantum Security of the Sponge Construction.
Jan CzajkowskiLeon Groot BruinderinkAndreas HülsingChristian SchaffnerDominique UnruhPublished in: PQCrypto (2018)
Keyphrases
- information security
- intrusion detection
- security requirements
- security issues
- information assurance
- security management
- security systems
- security mechanisms
- access control
- network security
- security policies
- quantum computation
- security problems
- functional requirements
- computer security
- computer networks
- sensitive data
- data management
- e government
- evolutionary algorithm
- database systems
- information systems
- security measures
- high security
- information retrieval
- neural network