On the security of Circulant UOV/Rainbow.
Yasufumi HashimotoPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- information security
- security requirements
- intrusion detection
- security policies
- access control
- fourier transform
- security measures
- computer security
- least squares
- information assurance
- security management
- security problems
- security systems
- security issues
- network security
- data mining
- statistical databases
- key management
- case study
- security analysis
- security properties
- neural network
- security vulnerabilities
- database
- computer systems
- distributed systems
- databases
- real time
- high security