Quantum Attacks on HCTR and its Variants.
Mostafizar RahmanGoutam PaulPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- countermeasures
- quantum computation
- quantum computing
- traffic analysis
- real time
- watermarking algorithm
- security mechanisms
- security protocols
- malicious users
- quantum inspired
- attack detection
- data mining
- digital image watermarking
- stream cipher
- computer security
- terrorist attacks
- denial of service attacks
- security threats
- java card
- computer systems
- detecting malicious