CCA Security and Trapdoor Functions via Key-Dependent-Message Security.
Fuyuki KitagawaTakahiro MatsudaKeisuke TanakaPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- high security
- information security
- network security
- access control
- security issues
- security requirements
- security threats
- computer security
- security policies
- private key
- security mechanisms
- information assurance
- security problems
- security systems
- security level
- security model
- neural network
- functional requirements
- security measures
- data mining