On the Hardness of Proving CCA-Security of Signed ElGamal.
David BernhardMarc FischlinBogdan WarinschiPublished in: Public Key Cryptography (1) (2016)
Keyphrases
- information security
- network security
- security policies
- security issues
- phase transition
- access control
- security requirements
- data security
- learning theory
- intrusion detection
- np complete
- sensitive data
- security mechanisms
- canonical correlation analysis
- np hard
- computer security
- security threats
- security level
- information assurance
- security management
- security properties
- np hardness
- security model
- security analysis
- functional requirements