Login / Signup
CCA Security and Trapdoor Functions via Key-Dependent-Message Security.
Fuyuki Kitagawa
Takahiro Matsuda
Keisuke Tanaka
Published in:
J. Cryptol. (2022)
Keyphrases
</>
high security
information security
network security
intrusion detection
security issues
security requirements
security threats
security policies
security management
access control
security properties
computer security
security mechanisms
security vulnerabilities
security problems
information assurance
security level
user authentication
security systems
statistical databases
data security
canonical correlation analysis
security protocols
data integrity
security analysis
key management
encryption scheme
security measures
smart card
data sets