CCA Security and Trapdoor Functions via Key-Dependent-Message Security.
Fuyuki KitagawaTakahiro MatsudaKeisuke TanakaPublished in: J. Cryptol. (2022)
Keyphrases
- high security
- information security
- network security
- intrusion detection
- security issues
- security requirements
- security threats
- security policies
- security management
- access control
- security properties
- computer security
- security mechanisms
- security vulnerabilities
- security problems
- information assurance
- security level
- user authentication
- security systems
- statistical databases
- data security
- canonical correlation analysis
- security protocols
- data integrity
- security analysis
- key management
- encryption scheme
- security measures
- smart card
- data sets