Pseudorandom unitaries with non-adaptive security.
Tony MetgerAlexander PorembaMakrand SinhaHenry YuenPublished in: CoRR (2024)
Keyphrases
- pseudorandom
- stream cipher
- encryption algorithm
- uniformly distributed
- secret key
- random number
- random numbers
- security requirements
- network security
- information security
- security problems
- intrusion detection
- access control
- computer security
- security level
- security issues
- data structure
- information assurance
- encryption scheme
- security threats
- information systems
- feature selection