Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms.
Ehsan Ebrahimi TarghiDominique UnruhPublished in: TCC (B2) (2016)
Keyphrases
- information security
- computer security
- intrusion detection
- security problems
- security issues
- access control
- quantum computation
- high security
- data security
- security requirements
- security policies
- security management
- security vulnerabilities
- statistical databases
- network security
- cyber attacks
- security threats
- quantum computing
- information assurance
- key management
- cyber security
- information systems
- genetic algorithm
- quantum mechanics
- data sets
- database