On the (In)Security of the BUFF Transform.
Jelle DonSerge FehrYu-Hsuan HuangPatrick StruckPublished in: CRYPTO (1) (2024)
Keyphrases
- access control
- information security
- security problems
- security issues
- security policies
- intrusion detection
- security requirements
- network security
- data security
- computer security
- security mechanisms
- real time
- security systems
- information assurance
- security threats
- security measures
- network management
- statistical databases
- computer networks
- low cost
- multiscale
- information systems