Counterexamples to New Circular Security Assumptions Underlying iO.
Samuel B. HopkinsAayush JainHuijia LinPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- information security
- security issues
- security systems
- statistical databases
- security requirements
- security mechanisms
- information assurance
- security management
- computer security
- key management
- intrusion detection
- functional requirements
- security policies
- highly efficient
- network security
- security analysis
- data security
- security level
- security threats
- access control
- cyber security
- high security
- learning algorithm