On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security.
Jiangxia GeTianshu ShanRui XuePublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- information security
- security issues
- canonical correlation analysis
- intrusion detection
- network security
- access control
- security problems
- security systems
- computer security
- neural network
- security management
- data security
- security protocols
- security analysis
- security mechanisms
- security model
- network management
- security level
- security policies
- data sets
- security vulnerabilities